SSO-SAML Custom Feature

Saml icon.png

This custom feature allows to setup Single Sign-On process for you as the system admin and your account users thus enabling login to system from MS Azure applications panel. You can create users in MS Azure within the desired access level groups and the corresponding user types will be added in your system on the first login.

Please note!
Currently SSO is available with Microsoft Azure only.

How to use

1. Create account at Microsoft Azure if you do not have one yet.

2. Enable SSO: SAML Custom feature on your Custom features page .
Sso enable path.png

3. Navigate to Manage to edit the connection settings.
Sso settings path.png

4. Click on Microsoft Azure Configuration on the left and log in to your MS Azure account there to start connection setup.
Please note! You need to have administrator access in MS Azure as well to be able to connect applications.
Sso start connection setup.png

5. After successful login you will see the first block with basic options on side.
Sso basic settings block.png

6. In MS Azure please navigate to Active Directory.
Ms azure select active directory.png

7. Select Enterprise applications in the left-side menu and add new application.
(you may need paid MS Azure or Premium trial subscription there to add applications)
Ms azure select enterprise applications.png

Ms azure new enterprise applications.png

8. Choose non-gallery type. Add its name and save.

9. On the next page click on Set up single sign on and select SAML.
Ms azure select single sign on.png

Ms azure select single sign on saml.png

10. Use Pen icon in Basic SAML Configuration block to edit.
Ms azure saml basic edit path.png

11. Copy the urls from SSO: SAML feature to the corresponding boxes on MS Azure side. Save.
Sbm saml basic settings page.png

12. On MS Azure side scroll to SAML Signing Certificate part and download Certificate(Base64). Open it with notepad or similar text editor, copy the certificate code and paste it to the corresponding box into SSO: SAML Custom Feature.
Sbm saml download cetrificate.png

Sbm saml certificate copy.png

13. Scroll MS Azure side page to Set up For tutorial block and find Login URL, Azure AD Identifier and Logout URL options, Copy each of them and paste to the corresponding boxes on side.
Sbm saml to tutorial block.png

14. Go to User attributes and claims block on MS Azure side and click on Pen icon to edit it.
Ms azure user attributes and claims.png

15. For Unique User Identifier(click on it to edit) please set user.mail variable as Source Attribute. It is the parameter that will allow us to differentiate between different user logins.
Ms azure user attributes and claims identifier.png

Ms azure user attributes and claims identifier mail.png

16. For additional claims please add Groups option using Add group claim and Email and Name with Add new claim buttons correspondingly.
You can also add phone and last name if you need. See claims setup example below.
Ms azure user attributes and claims add claim.png

17. Copy the claims titles to the corresponding boxes on side.
Sso saml claims titles copy.png

18. Navigate to Azure Active Directory homepage and go to Users section, create all users that you would like to access the system if they are not created yet.
Ms azure add users path.png

19. In Groups create groups that will correspond to user types. For example, Admins for admin level users, Senior Employees for Senior Employee access, etc.
You can create only one group if all your users have admin access, for example.
Ms azure add groups path.png

20. Add users to the corresponding groups.
Ms azure add groups users.png

21. Make sure each group contains the corresponding memberships.
Ms azure add groups memberships.png

22. Copy each group Object ID to the corresponding box in User Group matching settings on side.
(If you have only one group for admins insert same object ID everywhere in that block). Save settings.
Copy object ids from azure to sbm.png

23. Once the users are given the access to Applications dashboard they can log in to with their access level by a click on the application icon.
Application panel to login with saml.png

The corresponding user types will be added automatically to your account with the data passed according to your settings.

Please note!
  • It is not possible to connect existing side users to MS Azure users.
  • For such users it is not possible to reset passwords, edit access level, username, access personal data report.
They need to contact MS Azure administrator if they loose access to applications page or contact default admin to request personal data report.
  • If you need to restrict access for such users you can remove or block them on MS Azure side.
  • If you change the group the user is included to on MS Azure side or remove the user there the access level will be updated on side within several minutes or the user will be logged out.