How to configure SAML SSO with Azure¶
This guide walks you through configuring SAML-based Single Sign-On (SSO) with Azure AD (Microsoft Entra ID) as your Identity Provider (IdP) for your Capawesome Cloud organization. In this setup, Azure AD acts as the IdP and Capawesome Cloud acts as the Service Provider (SP).
Prerequisites¶
Before you begin, ensure you have:
- Administrator access to your organization's Microsoft Entra admin center
- Owner or Admin role in your Capawesome Cloud organization
Step 1: Create an Application in your Identity Provider¶
- Sign in to the Microsoft Entra admin center.
- Navigate to Identity > Applications > Enterprise applications in the left sidebar.
- Click New application.
- Click Create your own application.
- Enter a name for the application (e.g.,
Capawesome Cloud). - Select Integrate any other application you don't find in the gallery (Non-gallery).
- Click Create.
Step 2: Configure your Application¶
- In your newly created application, navigate to Manage > Single sign-on.
- Select SAML as the single sign-on method.
The Basic SAML Configuration dialog will appear.
- Click Edit on the Basic SAML Configuration section.
- Open a new browser tab, navigate to your organization's settings in the Capawesome Cloud Console, scroll to the Single Sign-On (SSO) section, and click Configure to view the required URLs.
- In Capawesome Cloud, copy the SP Entity ID and paste it into the Identifier (Entity ID) field in Azure.
- Copy the Callback URL from Capawesome Cloud and paste it into the Reply URL (Assertion Consumer Service URL) field in Azure.
- Leave Sign on URL, Relay State and Logout URL empty.
- Click Save.
Step 3: Configure Attributes and Claims¶
Azure AD sends user information to Capawesome Cloud through SAML attributes. The default configuration should work for most cases, but verify the following claims are present:
- Click Edit on the Attributes & Claims section.
- Ensure these claims are configured:
| Claim | Value |
|---|---|
| Unique User Identifier (Name ID) | user.mail |
| emailaddress | user.mail |
| givenname | user.givenname |
| surname | user.surname |
| name | user.displayname |
The Unique User Identifier (Name ID) must be set to user.mail to properly identify users by their email address.
Step 4: Download the Certificate and Get URLs¶
In your Azure AD application, locate the SAML Certificates section:
- Download the Certificate (Base64) file. You will need this to complete the configuration in Capawesome Cloud.
- Note the Login URL from the Set up section. This is your Identity Provider's SSO URL.
The Login URL typically follows this format:
Step 5: Assign Users and Groups¶
User management for SSO is handled through Azure AD. Before users can authenticate via SSO, they must be assigned to the application:
- Navigate to Manage > Users and groups in your Azure AD application.
- Click Add user/group.
- Select the users or groups who should have access to Capawesome Cloud.
- Click Assign.
Only assigned users will be able to authenticate to Capawesome Cloud through this SSO configuration.
Step 6: Complete Configuration in Capawesome Cloud¶
- Return to your organization's SSO settings in the Capawesome Cloud Console.
- Enter the Microsoft Entra ID from Azure AD into the Issuer field.
- Enter the Login URL from Azure AD into the Entry Point field.
- Enter your domain (e.g.,
yourcompany.com) into the Domain field. - Open the downloaded certificate file in a text editor.
- Copy the entire certificate content (including the
-----BEGIN CERTIFICATE-----and-----END CERTIFICATE-----lines) and paste it into the Public Certificate field.
The certificate should be in PEM format:
Step 7: Test the Configuration¶
- In the Capawesome Cloud Console, click Save and Test to verify your SSO configuration.
- You will be redirected to Microsoft's login page.
- Authenticate with your Azure AD credentials.
- Upon successful authentication, you will be redirected back to Capawesome Cloud.
A successful test confirms that the SAML configuration is working correctly.
Step 8: Enable SSO for Your Organization¶
After successfully testing the configuration:
- Navigate to your organization's settings and scroll to the Single Sign-On (SSO) section.
- Click the Enable button to activate SSO for your organization.
Once enabled, organization members will be required to authenticate through Azure AD to access organization resources.
Troubleshooting¶
AADSTS50011: Reply URL does not match¶
This error occurs when the Reply URL configured in Azure AD does not match the Assertion Consumer Service URL in Capawesome Cloud.
- Verify that the Reply URL in Azure AD exactly matches the URL shown in your Capawesome Cloud SSO settings.
- Check for trailing slashes or protocol mismatches (http vs https).
AADSTS700016: Application not found¶
This error indicates that the application identifier cannot be found in the Azure AD tenant.
- Verify that the Identifier (Entity ID) in Azure AD matches the Entity ID in Capawesome Cloud.
- Ensure the application is properly configured and saved.
Invalid Signature Error¶
This error occurs when the certificate validation fails.
- Ensure the certificate is in PEM format (Base64 encoded).
- Verify that the certificate has not expired.
- Check if the certificate has been rotated in Azure AD and update it in Capawesome Cloud if necessary.
User Not Assigned Error¶
If a user receives an error stating they are not assigned to the application:
- Verify that the user is assigned to the enterprise application in Azure AD.
- Check group memberships if using group-based assignment.
Missing or Incorrect User Attributes¶
If user information is not being correctly transferred:
- Verify the attribute mappings in the Attributes & Claims section in Azure AD.
- Ensure the user has the required attributes (email, name) populated in their Azure AD profile.