Configure Azure Active Directory as a SAML Identity Provider
This topic describes how to set up Azure Active Directory (AD) as your identity provider by configuring SAML integration in both Pivotal Web Services (PWS) and Azure AD.
Set up SAML in PWS
- Log in to the Single Sign-On (SSO) dashboard at
https://p-identity.run.pivotal.io
as a Plan Administrator. Select your plan and click Manage Identity Providers on the drop-down menu.
Click Configure SAML Service Provider.
(Optional) Select Perform signed authentication requests to enforce SSO private key signature and identity provider validation.
(Optional) Select Require signed assertions to validate the origin of signed responses.
Click Download Metadata to download the service provider metadata.
Click Save.
Set up SAML in Azure Active Directory
Sign into Azure AD at
https://manage.windowsazure.com
as an administrator.Navigate to the applications dashboard by clicking on your directory and the Applications tab.
Click the Add button to add a new application.
Select Add an application my organization is developing.
Enter the Name and Type for the application.
Enter the Sign-On URL and App ID URI for the application.
Click the application and configure the following properties:
- Enter the application Name.
- Enter the
AssertionConsumerService Location URL
from your downloaded service provider metadata into Sign-On URL. For example,https://AUTH-DOMAIN/saml/SSO/alias/AUTH-DOMAIN
. - Configure the application Logo, Application is Multi-Tenant and User Assignment Required to Access App properties.
- Enter your
Auth Domain URL
into App ID URI. - Enter the
AssertionConsumerService Location URL
from your downloaded service provider metadata into Reply URL.
Click the Save button.
Click View Endpoints and download the Federation Metadata Document.
Set up Claims Mapping
To enable user attribute mappings, grant the application the following permissions to Windows Azure Active Directory:
- Read directory data.
- Read all groups.
- Read all users’ full profiles or Read all users’ basic profiles.
To pass group membership claims to the application, perform the following steps:
- Click Manage Manifest.
- Click Download Manifest followed by Download manifest.
- Locate
groupMembershipClaims
and set the value to either:SecurityGroup
- Groups claim will contain identifiers of all security groups of which the user is a member.All
- Groups claim will contain the identifiers of all security groups and distribution lists of which the user is a member.
- Click Manage Manifest.
- Click Upload Manifest and select the modified manifest.