All Collections
Install fabriq
IT
SAML Single Sign-on 🔐 with Azure AD as the Identity Provider
SAML Single Sign-on 🔐 with Azure AD as the Identity Provider

How to setup SAML SSO with Azure AD as the Identity Provider (IdP)?

Mohamed Berrada avatar
Written by Mohamed Berrada
Updated over a week ago

Before proceeding with this article, ensure that you have read our article about SAML Single Sign-on 🔐

Here, we will outline the steps to set up Azure AD as an Identity Provider.

1️⃣ Create an Azure enterprise application

  1. Sign in to the Azure portal using your Azure AD administrator account.

  2. In the Azure portal, click on the Azure Active Directory in the left-hand navigation menu.

  3. Navigate to Enterprise Applications and then select All Applications

  4. Click on New application, then Create your own application

  5. Enter a name for your application (e.g. "Fabriq") and select Non-gallery application as the application type. Then click Add to create your application

2️⃣ Configure the application for SAML SSO

  1. Navigate to the Single sign-on tab

  2. Select SAML as the single sign-on method

  3. On the Set up single sign-on with SAML page, you will need to enter the following information, ℹ️ reach out to us so that we can provide it to you:

    • Identifier (Entity ID)

    • Reply URL (Assertion Consumer Service URL)

  4. Click Save to apply the changes

3️⃣ Configure the attributes for SAML SSO

  1. Within Attributes & Claims, click on Edit

  2. Click on Unique User Identifier (Name ID), set the Name identifier format to Persistent and the Source attribute to user.objectid or any other attribute that is and identifier and is also unique. Then, click on Save. The claims should look like as follows:

⚠️ The name claim that is set to user.userprincipalname needs to align with the email addresses of your users in Fabriq. If there's any discrepancy, you should modify it to user.mail or any other user field that matches the users' emails.

4️⃣ Assign users to Fabriq

  1. Navigate to the Users and groups tab

  2. Click the Add user/group button

  3. On the Add Assignment page, select the users you want to assign to the application and click Select to confirm your selection

5️⃣ Send us the App Federation Metadata Url

  1. Within the Single sign-on tab, navigate to section 3 SAML Certificates

  2. Copy the App Federation Metadata Url and send it to [email protected]

Did this answer your question?