SAML2 with Azure AD

If using Azure Active Directory for SSO a new or exisiting "App Registration" will need to be configured to provide be the SAML2 identity provider for Engine.

Step 1 - New or Existing App Registration

Step 2 - Edit the App Manifest

Now two fields of the app Manifest need to be edited (groupMembershipClaims and optionalClaims) which will be described in the below steps.

  • Select the new/existing app from Step 1 from the list of App Registrationsarrow-up-right and then select Manfiest (near the bottom) from the menu on the left.

  • In the editor, set groupMembershipClaimsarrow-up-right to either “All” or “SecurityGroup”. This pagearrow-up-right may help you decide which is most suitable for your organisation. If unsure, select All:

    • “SecurityGroup” - groups claim will contain the identifiers of all security groups of which the user is a member.

    • “All” - groups claim will contain the identifiers of all security groups and all distribution lists of which the user is a member

  • Set the value of the optionalClaimsto include these 4 claims: firstname, lastname, upn, email in the saml2Token. An example is below:

      "optionalClaims": {
          "idToken": [],
          "accessToken": [],
          "saml2Token": [
              {
                  "name": "email",
                  "essential": true
              },
              {
                  "name": "upn",
                  "essential": true
              },
              {
                  "name": "family_name",
                  "essential": true
              },
              {
                  "name": "given_name",
                  "essential": true
              }
          ]
      },
  • Click Save

Step 3 - Collect data required by Backoffice

The App Registration is now configured for Engine. Two pieces of info are required to be entered back into Backoffice (Step 3 of Configuring Engine for SAML2arrow-up-right):

Issuer

For Azure AD the "Issuer" will be the "Application (client) ID" found on the Overview page of your App Registrating, but with "spn:" added to the front. E.g. "spn:00000000-0000-0000-0000-000000000000" where the 0 digits are the Application (client) ID from Azure AD. Paste this value into the Issuer field of the SAML2 auth object that was created in Engine.

IDP Target URL

Also known as SAML2 sign-on endpoint. This is the url that Engine redirects users to in order to login with your SAML2 ID provider. For Azure AD it is : https://login.microsoftonline.com/arrow-up-right<TENANT-ID>/saml2 ** where the Directoy (tenant) ID can be seen on the Overview tab of your Azure App Registration. Paste this into the IDP Target URL field of the SAML2 auth object that was created in Engine

Last updated