Configure Azure Active Directory SSO with your platform

Let users sign in with their existing Azure AD credentials by configuring Single Sign-On (SSO) between Azure Active Directory (AD) and your platform site.

Before you start

Before you configure Azure Active Directory SSO with your platform, there are a few things to know:

  • You will need an Azure Active Directory P2 license.

  • Permission to create a “Non-gallery enterprise application” on Azure Active Directory.

  • You will need the URL for your provisioned platform site on the Wazoku Platform.

  • You will need the metadata file for your platform site. This can be downloaded from http://example.wazoku.com/saml_ol/metadata.xml where "example" is your domain name.

Note: We will use the following URL for our example platform site: saml-test.wazoku.com. When you configure Azure Active Directory SSO with your platform, you will need to replace this with your platform site URL.

1. Create a non-gallery enterprise application

  1. Log in to https://portal.azure.com as an administrator.

  2. Go to Azure Active Directory > Enterprise applications.

  3. Click +New application and select Non-gallery application.

  4. Enter a name for the application.

  5. Click Add.

2. Set up basic SAML information

  1. On the active application, select Single Sign On and then SAML.

  2. Next to Basic SAML Configuration, click edit_icon_azureAD Edit.

  3. Click add_file_icon File, select your metadata file, and then click Upload.

  4. Check the Identifier (Entity ID) and Reply URL (Assertion Consumer Service URL) fields are populated.

  5. Click Save.

3. Authorize users and groups

  1. On the active application, select Users and groups.

  2. Assign users and groups to the application that will access your platform site.

4. Set up user attributes and claims

  1. On the active application, select Single Sign On and then SAML.

  2. Next to User Attributes & Claims, click edit_icon_azureAD Edit.

  3. Delete the existing claims, and then click Add new claim.

  4. Enter the name and namespace you want to use.

  5. Under Choose name identifier format, select Persistent.

  6. For the Source, select Attribute.

  7. Select the Source attribute you want to use.

  8. Click Save.

Note: If you select “user.principalname” the field will be sent as an email address. If you don’t want to use the email address as unique ID, select another source attribute, such as “user.objectid”.

5. Download and send SAML signing certificate information

  1. On the active application, select Single Sign On and then SAML Signing Certificate.

  2. Next to Federated Metadata XML, click Download.

  3. Send the metadata file and claim name to our support team at support@wazoku.com.

Once we receive the metadata file and the claim name, we will configure your platform site to accept the claim.

See also