Skip to main content
Matrix42 Self-Service Help Center

Identity Provider Integration II: Azure Active Directory

Azure Active Directory

For the SAML2 usage with Azure Active Directory you’ll need first to configure your Azure Tenant.

Search and add Silverback application

  • Login to https://portal.azure.com as an administrator
  • Navigate to Azure Active Directory
  • Navigate to Enterprise Applications
  • Click +New application
  • Search for Silverback
  • Select Silverback
  • Click Add
  • Wait until the application will be opened

Set up single sign on

Review Claims and Copy Metadata

  • Review under Attributes & Claims the Name attribute. It should be set automatically to user.userprincipalname. This Attribute will be used later on in Silverback and is important for a Co-existence with an active LDAP connection in Silverback.

When you click the edit button at Attributes & Claims , you can review the responsible Claim (Schema - http://schemas.xmlsoap.org/ws/2005/0...ty/claims/name) for Name

  • Copy the App Federation Metadata to your Clipboard (Click to Copy)

Grant Access for Users

  • Navigate to Users and groups 
  • Click Add User
  • Select all Users and Groups you want to grant access
  • Click Assign
  • Was this article helpful?