Skip to main content

Configuring SSO in Microsoft Azure

Marie Xhauflair avatar
Written by Marie Xhauflair
Updated over a week ago

Setting up a SAML2 SSO requires configuration in both the TinQwise platform and an "identity provider". Microsoft Azure is a common identity provider, and this article will show you how to set it up.

In Azure, you'll be creating an enterprise application in Microsoft Entra (formerly called Azure Active Directory or Azure AD). Start by logging in to the Azure portal and going to Microsoft Entra.


Step A: Create the enterprise application

  1. In the left-hand menu, go to Enterprise applications

  2. Click + New application

  3. Select Create your own application

  4. Enter a name for the application: TinQwise and select the Non-gallery option

The application you just created is shown.

How_to_configure_SAML_2.0_for_Azure_-_Set_up_single_sign_on.png


Step B: Set up single sign on

  1. Click "Set up single sign on" (from the application you just created above)

    1. How_to_configure_SAML_2.0_for_Azure_-_Set_up_single_sign_on.png

  2. Select SAML as the single sign-on method

  3. Download your metadata file from

    1. https://[yourplatformname].platform.co.nl/saml2/metadata/

  4. Save this file on your computer.

  5. In Azure, click Upload metadata file

    1. Upload the file you downloaded

    2. The settings will be filled in automatically.


Step C: Copy the metadata URL

  1. After uploading (step B.5 above), copy the App Federation Metadata Url

    1. We'll need this in the next step when configuring the TinQwise application


πŸ“Έ Reference: Default settings in Azure

These are the default SAML settings after uploading the metadata file:

Basic SAML Configuration

  • Identifier (Entity ID)
    ​https://[yourplatform].platform.co.nl/saml2/metadata

  • Reply URL (Assertion Consumer Service URL)
    ​https://[yourplatform].platform.co.nl/saml2/acs/

  • Logout URL (Optional)
    ​https://[yourplatform].platform.co.nl/saml2/ls/

Attributes & Claims

Required claim:

Claim name

Value

Unique User Identifier (Name ID)

user.userprincipal [name...

Additional claims:

Claim name

Value

emailaddress (.../emailaddress)

user.mail

givenname (.../givenname)

user.givenname

surname (.../surname)

user.surname

name (.../name)

user.userprincipalname

Did this answer your question?