SAML2.0 - Creating an Azure Active Directory (AAD) Enterprise Application

Summary

This guide provides step-by-step instructions on configuring Azure Active Directory (AAD) as your Identity Provider (IDP) for MazeMap using SAML 2.0.

Skill Level

Intermediate / Familiarity with Azure Active Directory and SAML configurations.

Prerequisites

Before you begin, please ensure the following:

  • You have administrative access to your Azure Active Directory (AAD) account.

  • Your AAD supports SAML 2.0.

  • You have received the CUSTOMER_ID from MazeMap.

Step-by-Step Guide to AAD Configuration

Step 1: Create an Azure Active Directory (AAD) Enterprise Application

  1. Log in to your AAD account.

  2. Click on "Enterprise applications."

     

     

  3. Click on "New application"

     

  4. Click on "Create your own application."

     

  5. Enter your desired name for your application

     

  6. Under Getting Started, select Set up single sign

     

  7. Then select SAML

Step 2: Configure SSO with SAML

  1. Under "Getting Started," select "Set up single sign on," then select "SAML."

  2. Use the information received from MazeMap to fill in the following fields:

    Basic SAML Configuration

Identifier (Entity ID):

https://auth.mazemap.com/saml2/<customer_id>

Reply URL (Assertion Consumer Service URL):

https://auth.mazemap.com/saml2/<customer_id>/callback?client_name=<customer_id>SAML2

Sign on Url

https://auth.mazemap.com/saml2/<customer_id>/login

Relay State (Optional)

https://use.mazemap.com

Logout Url (Optional):

https://auth.mazemap.com/saml2/<customer_id>/logout

Attributes and Claims

givenname

user.givenname

surname

user.surname

emailaddress

user.mail

name

user.userprincipalname

companyname/OrganizationID

user.companyname

Unique User Identifier

user.userprincipalname

groups

user.groups

  1. Send the metadata URL in the field "App Federation Metadata URL" to MazeMap.

Step 4: Application ID

Send the Application ID to the CSM assigned to the project, as this needs to be included in the configuration on MazeMap’s end. To collect the Application ID, click on the MazeMap SSO in the list of applications under “Enterprise Applications” in the Azure Portal.

Step 5: Add Users or Groups

You need to add users or groups to the application you’ve just created. This indicates the users that are allowed to sign in with the application.


Troubleshooting

 

Conclusion

Configuring Azure Active Directory as your IDP enhances security by integrating MazeMap with your organisation's existing authentication systems. Follow this guide to set up and manage SSO and group access effectively in your MazeMap applications.