Identity Provider Integration II: Azure Active Directory
Azure Active Directory
For the SAML2 usage with Azure Active Directory you’ll need first to configure your Azure Tenant.
Search and add Silverback application
- Login to https://portal.azure.com as an administrator
- Navigate to Azure Active Directory
- Navigate to Enterprise Applications
- Click +New application
- Search for Silverback
- Select Silverback
- Click Add
- Wait until the application will be opened
Set up single sign on
- Click Get started on Setup single sign on
- Select SAML
- Click the Edit Button for Basic SAML Configuration
- Add as Identifier (Entity ID) your Silverback URL without https (e.g. silverback.company.com) - ignore in case the pattern example
- Add as Reply URL your Silverback URL in the following format: https://silverback.company.com/sts/authorize/login
- Add as Sign on URL your Silverback URL in the following format https://silverback.company.com/ssp
- Click Save
- Click X to Close
- Select No, I'll test later
Review Claims and Copy Metadata
- Review under Attributes & Claims the Name attribute. It should be set automatically to user.userprincipalname. This Attribute will be used later on in Silverback and is important for a Co-existence with an active LDAP connection in Silverback.
When you click the edit button at Attributes & Claims , you can review the responsible Claim (Schema - http://schemas.xmlsoap.org/ws/2005/0...ty/claims/name) for Name
- Copy the App Federation Metadata to your Clipboard (Click to Copy)
Grant Access for Users
- Navigate to Users and groups
- Click Add User
- Select all Users and Groups you want to grant access
- Click Assign