Developer Pro Add on

Inbound SSO SAML - Azure AD

This document provides instructions to add a custom Identity provider (Azure) using Inbound SAML - SSO. As a result, it will allow your consumers to log in to your application with their Azure account using SSO.

Azure AD Configuration

  1. Log into the Azure portal with your developer account.
  2. Click the View button from the Manage Azure Active Directory card.
  3. In the left navigation pane, click the Enterprise Applications, the below screen will appear:

  4. Click the + New application and then click the + Create your own application, as highlighted below:

  5. Enter the name of your app and click the Create button. Upon app creation, you will be redirected to your application page.
  6. Click the Set up single sign on card from the below screen:

  7. Click the SAML as a single sign-on method, and the below screen will appear:

  8. Click the Edit icon given next to the Basic SAML Configuration and enter below SAML configuration:

    a) Identifier (Entity ID): https://<LoginRadius App Name>

    b) Reply URL (Assertion Consumer Service URL): https://<LoginRadius App Name>

    c) Sign on URL: https://<LoginRadius App Name>

  9. Save the configuration

LoginRadius Account Configuration

To support the Inbound SSO - SAML, you will need to handle the following:

  1. Log into your LoginRadius Dashboard account, select your app and then navigate to the Integration section.

    The following screen will appear:

  2. Click the Add button for adding a new Inbound SSO SAML app. The configuration options will appear.
  3. Search for Inbound SSO SAML in the search bar, locate Inbound SSO SAML and click the Let’s Configure option.

    The following screen will appear:

  4. Enter or select the following values:
  5. Enter the Provider Name.
  6. Enter the Display Provider Name.
  7. Select IDP Binding : urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST
  8. Enter the IDP Location:****eeaa60/saml2
  9. Enter the IDP Logout URL:*****bfd7-62dda0eeaa60/saml2
  10. Enter the IDP Certificate from the Azure app. You can download the IDP Certificate from Azure.
  11. Enter the SP Certificate and SP Private Key that you have generated while doing Azure AD Configuration.
  12. Enter the Relay state param, i.e: RelayState.
  13. Data Mapping: Add the fields you want to map along with Email.

    Key Value
  14. Click the Save button to save the configuration.

You have successfully configured Azure IDP using Inbound SSO SAML. Open Auth Page(IDX) of your app, and the Login with Azure AD option will appear: