Skip to main content

Set Up SAML with Microsoft Azure Active Directory

This document outlines the process to setup SAML with Microsoft Azure Active Directory. This operation requires “Administrator” privileges


IdP-initiated SAML

Specify urn:oasis:names:tc:SAML:2.0:nameid-format:persistent for the format and Persistent Identifier for the value. For attribute mapping, provide the user’s email address as “email”.

Microsoft’s Azure Active Directory (Azure AD) supports SAML authentication, and you can manage DeployGate accounts using your organization’s AD authentication infrastructure. For specific configuration instructions, please refer to the official Azure document, “Quickstart: Enable single sign-on for an enterprise application.

Please see the following table for the corresponding values between Azure and DeployGate.

Azure Active DirectoryDeployGate
Sign on URLSSO URL
Identifier (Entity ID)Entity ID
Reply URL (Assertion Consumer Service URL)ACS URL
RelayStateOptional: Specify Enterprise’s main page. Otherwise, omit.

After enabling SAML authentication, you must assign users to the application. Please assign DeployGate as a service provider for the account.

ScreenShot of SAML Azure

To register the app, go to Azure Active Directory, select Enterprise applications, and select Add an application.

ScreenShot of SAML Azure To register DeployGate, select “non-Gallery application” to configure the settings.