Azure AD (SAML SSO)

Mar 6, 2022

Microsoft Azure

Want to use your Azure AD for your Single Sign-On? Pipeline can integrate with your SAML Identify Provider (IdP). Follow this solution guide to setup this integration.

Want the automation but not the hassle of setup and maintenance?

With Managed integrations, we'll do all the heavy-lifting, so that you can focus on more important things!

Chat with us to learn more ยป

Prerequisites

You will the following before you can enable SAML SSO for Azure AD:

  • Azure AD Premium Subscription
  • Pipeline: Custom Single Sign-On addon

Configure Your Azure Account

Add the Pipeline service

To configure your Azure account:

  1. Log on to Azure and select the Enterprise Applications service
  2. Client New Application and select Non-gallery application
    1. Name Pipeline SAML SSO
  3. Click Add

Configure SSO for SAML

For the Pipeline service, click Single sign-on and select SAML

Basic SAML Configuration

Update the following parameters:

  • Identifier (Entity ID) https://[your_instance]/signin/saml-getspmetadata.aspx
  • Reply Url (Assertion Consumer Service URL) https://[your_instance]/saml/idp/user-authenticate.aspx

It should look like the following after the update:

User Attributes & Claims

Update the Unique User Identifier to be user.mail:

It should look like the following after the update:

Download the Certificate

After you've made the configurations:

  1. Download the Certificate (Base64)
  2. Copy the Login Url, Azure AD Identifier, and Logout Url

Send the above information to our support help desk or in-app chat to integrate Pipeline with your SAML SSO.

Configure Users and Groups

Be sure to add the proper users and groups that will be allowed to use this SAML SSO.

Back to Top


Additional Resources
  • Azure: Configure SAML-based single sign-on to non-gallery applications
    With SAML single sign-on, Azure AD authenticates to the application by using the user's Azure AD account. Azure AD communicates the sign-on information to the application through a connection protocol. You can map users to specific application roles based on rules you define in your SAML claims.