Skip to main content

How to Create SAML App in AzureAD and How to Enable SSO

 Introduction:

In today's digital landscape, Single Sign-On (SSO) has become a crucial requirement for organizations to enhance user experience and streamline access to various applications. Azure Active Directory (Azure AD) offers robust capabilities for managing identities and enabling SSO through Security Assertion Markup Language (SAML) applications. In this article, we will explore the process of creating a SAML app in Azure AD and enabling SSO, paving the way for a seamless authentication experience for your users.

Prerequisites:
Before diving into the implementation steps, ensure you have the following prerequisites:

  • An active Azure subscription.
  • Administrative access to Azure AD.

Step 1: Create a new SAML application
  • Log in to the Azure portal (portal.azure.com) using your administrative credentials.
  • Navigate to the Azure Active Directory service.
  • Select "Enterprise Applications" from the left-hand navigation pane.
  • Click on "New application" to create a new application.
  • Choose "On-premises application" from the provided options.
  • In the "Set up single sign-on" page, select "SAML-based Sign-on."

Step 2: Configure basic application details

  • Enter a name for your application, such as "My SAML App," and click on "Add."
  • In the "Single Sign-on Mode" section, select "SAML-based Sign-on."
  • Click on the "Save" button to continue.

Step 3: Configure SAML settings

  • In the "Set up single sign-on with SAML" page, enter the following information:
  • Identifier (Entity ID): A unique identifier for your application.
  • Reply URL (Assertion Consumer Service URL): The URL where Azure AD will send SAML responses.
  • Sign on URL: The URL where users should be redirected for sign-on.
  • Click on "Save" to proceed.

Step 4: Configure user attributes and claims

  • In the "User Attributes & Claims" section, click on "Add new claim."
  • Provide a name for the claim, such as "Email," and select the appropriate "Source Attribute."
  • Ensure the claim is marked as "Required."
  • Repeat the process for any additional claims you need for your application.
  • Click on "Save" to save the claim configuration.

Step 5: Assign users and groups

  • In the "Assign users and groups" section, click on "Add user/group."
  • Select the users or groups who should have access to the SAML application.
  • Click on "Assign" to save the assignment.

Step 6: Test and enable SSO

  • In the "Set up single sign-on with SAML" page, click on "Test SAML-based Sign-on."
  • Ensure the test is successful, indicating that the SSO configuration is working correctly.
  • Once the test passes, return to the "Set up single sign-on with SAML" page.
  • Toggle the "Enable SAML-based Sign-on" option to enable SSO for your application.
  • Click on "Save" to finalize the configuration.

Conclusion:
Congratulations! You have successfully created a SAML application in Azure AD and enabled Single Sign-On (SSO). By following these steps, you have streamlined the authentication process, providing your users with a seamless experience when accessing your application. Azure AD's robust SSO capabilities combined with the power of SAML will enhance security and productivity within your organization, paving the way for a more efficient and secure identity management strategy.

Comments