Your organization
Access management

MS Azure AD SAML

9min
this feature is available to enterprise customers the following manual configuration creates an saml sso configuration for your enterprise organization prerequisites owner role in an enterprise organization administrative access to your organization's microsoft azure ad portal supported features this configuration supports the following service provider initiated sso single log out \[optional] configuration steps before configuring sso, you need to assign a namespace and download your service provider certificate in {{product name}} these steps provide information you need to enter later create your namespace in make click organization in the left sidebar click the sso tab under namespace , enter the namespace you want for your organization for example, acmecorp your organization members enter this namespace when they log in via sso under sso type , select saml 2 0 copy the redirect url and save it in a safe place you will use this later when you create your saml integration in the microsoft azure ad portal create an saml application in the ms azure portal log in to the microsoft azure portal and navigate to the azure active directory ms azure portal in the left navigation, click enterprise applications click + new application click + create your own application enter a name for your app and select integrate any other application you don't find in the gallery click create in the left navigation, click single sign on single sign on click saml configure your basic saml settings using the redirect url ( https //www make com/sso/saml/{namespace} ) that you copied in the ms azure ad saml docid\ lefn8ytgnmloiwhcpaeum field value entity id https //www make com/sso/saml/{namespace}/metadata xml reply url https //www make com/sso/saml/{namespace} logout url https //www make com/sso/saml/{namespace} in the attributes & claims section, click edit to rename your attributes under additional claims , find the value you want to edit and click that row enter the new name in the name field use the following chart to find the names required for your iml resolve field value email user mail name user displayname id user userprincipalname unique user identifier user userprincipalname click save copy the login url and save it in a safe place download the saml certificate you need to download the base 64 saml certificate from microsoft azure and upload it to the identity provider certificate field of the sso tab in your {{product name}} organization find the saml certificates section of your single sign on settings in the microsoft azure portal next to certificate (base64) , click download your browser automatically downloads the cer file update the sso in make click organization in the left sidebar click the sso tab under identity provider certificate , click extract a pop up appears under p12, pfx or pem file , click choose file and select the cer file you downloaded enter the following information from ms azure into the idp login url and identify provider certificate fields field value to enter from ms azure idp login url login url identity provider certificate certificate (base 64) enter the following in the login iml resolve field {"email" "{{user name id}}","id" "{{get(user attributes id,1)}}","name" "{{get(user attributes firstname,1)}}"} select the following settings field value allow unencrypted assertions yes allow unsigned responses no sign requests yes sso settings click save you will receive an email with the subject "activation complete sso ready for your organization" upon successful activation if you encounter any issues while logging in using sso, disable sso using the "one time link" (valid for 24 hours) service provider initiated sso go to make com click sign in with sso enter the namespace you chose for your organization log in using your microsoft credentials and consent to {{product name}} 's access to your user data