Skip to main content
Version: 3.2.0

Microsoft Entra ID Authorization Provider (SAML)

The following steps will guide you through configuring a SAML Authorization Provider using Microsoft Entra ID as the identity provider for authentication.

Create an Enterprise Application

  1. Login to https://portal.azure.com

  2. Navigate to Microsoft Entra ID

    Azure Portal Homepage
  3. In the left-hand navigation pane, expand Manage and select Enterprise Applications

    Enterprise Applications Navigation
  4. Click New application to begin creating your new SAML application

    Create new Enterprise Application
  5. Click Create your own application

    Create your own Enterprise Application
  6. Enter a descriptive name for your application

    Naming Enterprise Application
  7. Click Create

    You will be redirected to the application's overview page

    Enterprise Application Overview

Configure Single sign-on

You now need to configure SAML single sign-on for your Enterprise Application

  1. From the left-hand navigation panel, expand Manage, then click Single sign-on

    Enterprise Application - Single sign-on Navigation
  2. On the Single sign-on page, select SAML

    Select Single sign-on method

    You will then see the configuration options for setting up single sign-on

    Single sign-on setup page
  3. In the Basic SAML Configuration section, click Edit and configure the following:

    • Identifier (Entity ID):
      https://<hostname_of_asi3_system>>:50443/auth/realms/ASI

    • Reply URL (Assertion Consumer Service URL):
      https://<hostname_of_asi3_system>>:50443/auth/realms/ASI/broker/<auth_provider_name>/endpoint

tip

The <auth_provider_name> refers to the name of the Authorization Provider that you’ll configure later in ASI 3


  1. In the Attributes & Claims section, click Edit. Remove the namespace from all existing claims and then add the following two claims:

    • Click Edit

      You will be presented with the default Attributes & Claims that were configured when setting up the Enterprise Application

      Default SAML Attributes & Claims

    • Add the following claims:

      Claim NameTypeValue
      usernameClaimJoin (user.givenname, "\_", user.surname)
      groupGroup Claimhttp://schemas.microsoft.com/ws/2008/06/identity/claims/groups


note

To map a Microsoft Entra ID group to your Enterprise Application, proceed with the steps outlined below

  1. Navigate to the Users and groups section in your Enterprise Application.

    Enterprise Application - Users & Groups Navigation
  2. Click Add user/group

    Users & Groups - Add User or Group
  3. Under Users and groups, select the group you wish to assign to the application.

    Users & Groups - Assign Group
  4. Click Assign

ASI - Authorization Provider Configuration

note

Once the Enterprise Application is ready, proceed to configure the Authorization Provider in ASI 3

  1. Login to your ASI 3 system

  2. From the left-hand navigation panel, go to SettingsAccess ManagementAuthorization Providers

    ASI 3 - Authorization Providers Page
  3. Click Create at the top-right and select SAML. You will be presented with the SAML configuration form

    ASI 3 - SAML Configuration Form
  4. In the Alias field, enter the same value you used for <auth_provider_name> during SSO setup

  5. (Optional) Provide a friendly name in the Display Name field.

note

You can now choose to import the IDP discovery descriptor either from a file or by specifying a URL

Import config from file

note

If you choose to import the descriptor configuration from a file, download the metadata file from your Enterprise Application

  1. In ASI 3, ensure File/URL descriptor import is set to false (default)

  2. In your Enterprise Application, navigate to Single sign-on

  3. On the left, expand Manage, then select Single sign-on

  4. Under SAML Certificates, copy the App Federation Metadata Url and save its contents to a file

  5. Return to ASI 3 and upload the file. The form will auto-populate upon successful import

  6. Set NameID policy format to Persistent

  7. Set Principal Type to Subject NameID

  8. Enable both:

    • HTTP-POST binding response
    • HTTP-POST binding for AuthnRequest

URL descriptor import

note

If you choose to import the descriptor configuration via URL, copy the metadata URL from your Enterprise Application

  1. Set File/URL descriptor import to true

  2. In your Enterprise Application, go to Single sign-on

  3. Under SAML Certificates, copy the App Federation Metadata Url

  4. Paste this URL into the Import config from URL field in ASI 3 and click Get Configuration

  5. Set NameID policy format to Persistent

  6. Set Principal Type to Subject NameID

  7. Enable both:

    • HTTP-POST binding response
    • HTTP-POST binding for AuthnRequest

note

You’re now ready to configure the attribute mappers for the Authorization Provider


  1. On the SAML configuration form, click Next

  2. On the Mappers page, click Add Mappers

  3. We now need to map the attributes and claims we configured when creating the Enterprise Application to ASI

    Attribute Importer

    NameSync ModeMapper TypeSAML Attribute NameSAML Friendly NameName FormatUser Attribute Name
    usernameFirst ImportAttribute ImporterusernameusernameBasicusername
    givennameFirst ImportAttribute ImportergivennamegivennameBasicfirstName
    surnameFirst ImportAttribute ImportersurnamesurnameBasiclastName
    emailaddressFirst ImportAttribute ImporteremailaddressemailaddressBasicemail

    Advanced Attribute to Group

    NameSync ModeMapper TypeKeyValueRegex Attribute ValuesGroup
    Name of Group in Microsoft Entra IDFirst ImportAttribute Importerhttp://schemas
    .microsoft.com/ws/2008/06/
    identity/claims/groups
    tenant_idfalseGroup in ASI that you want to assign the users to

  1. When you’ve finished configuring the mappers, click Finish

note

After setup is complete, users will see a new option on the ASI 3 login screen that allows them to sign in using their Microsoft Entra ID credentials


ASI 3 - Login Page with SAML option

If you experience any issues after configuring the provider, please contact Support