Configuring your Azure Active Directory Enterprise Application for SAML SSO

:books: Overview

SAML SSO Configuration utilizes SCIM 2.0 Provisioning’s Application Metadata URL to seamlessly integrate your Enterprise Application with a Service Provider’s application. Living Security has implemented support for using your application’s federated IDP Metadata URL to connect your environment with Training Platform. However, there are a few steps and values you will need on hand to help get your environment configured.

✅ Steps to Follow

ℹ️ Before we begin, please ensure you have access to your Training Platform’s SAML SSO Configuration tab. In order for Azure SAML SSO to be configured, you will need the Service Provider Entity ID, the Assertion Consumer Service URL and the optional Service Provider Sign Out URL. 

  1. Proceed to the Single Sign-on tab in your Enterprise Application in Azure.

  2. Select [SAML] to begin configuring for Single Sign-on

    Screen Shot 2022-01-25 at 4.18.09 PM
  3. Select [Edit] in Section 1: Basic SAML Configuration

    1. Paste the Service Provider Entity ID in the Identifier field

    2. Paste the Assertion Consumer Service URL in the Reply URL Field

    3. Optional: Paste the Service Provider Sign Out URL in the Logout URL field.

      Screen Shot 2022-01-25 at 7.34.12 AM
  4. Select [Save] once these fields are completed.

Congratulations! Your Azure Enterprise Application has been configured for SAML Single Sign-on! We may now proceed to the next step of configuring your Training Platform SAML SSO Configuration Tab, which you may find here[Link to Configuring your SAML SSO Configuration Tab article].

Next Steps