Set Up SAML with Microsoft Azure Active Directory
This document outlines the process to setup SAML with Microsoft Azure Active Directory. This operation requires “Administrator” privileges
Specify urn:oasis:names:tc:SAML:2.0:nameid-format:persistent for the format and Persistent Identifier for the value. For attribute mapping, provide the user’s email address as “email”.
Microsoft’s Azure Active Directory (Azure AD) supports SAML authentication, and you can manage DeployGate accounts using your organization’s AD authentication infrastructure. For specific configuration instructions, please refer to the official Azure document, “Quickstart: Enable single sign-on for an enterprise application.”
Please see the following table for the corresponding values between Azure and DeployGate.
Azure Active Directory | DeployGate |
---|---|
Sign on URL | SSO URL |
Identifier (Entity ID) | Entity ID |
Reply URL (Assertion Consumer Service URL) | ACS URL |
RelayState | Optional: Specify Enterprise’s main page. Otherwise, omit. |
After enabling SAML authentication, you must assign users to the application. Please assign DeployGate as a service provider for the account.
To register the app, go to Azure Active Directory, select Enterprise applications, and select Add an application.
To register DeployGate, select “non-Gallery application” to configure the settings.