SAML app setup
Various configurations for Azure are supported. The following is an example of an Azure setup.- Log into the Azure dashboard
- Head over to Microsoft Entra ID -> Add -> Enterprise Application
- Enter a name for the new app. This needs to match the name of the connection created in the configuration, so the following is recommended. If a different identifier is chosen then that needs to be reflected in all the configuration below. The
gr4vy_idhere is the name of the instance.- Sandbox:
{instance_id}-sandbox-saml - Production:
{instance_id}-production-saml
- Sandbox:
- Select the non-gallery option for the app type and select Create
- Select Single sign-on in the left menu
- Select SAML for the SSO method
- Edit the Basic SAML Configuration
- Set the identifier
- Sandbox:
urn:auth0:gr4vy:{instance_id}-sandbox-saml - Production:
urn:auth0:gr4vy:{instance_id}-production-saml
- Sandbox:
- Set the Reply URL
- Sandbox:
https://auth.gr4vy.com/login/callback?connection={instance_id}-sandbox-saml&organization={instance_id} - Production:
https://auth.gr4vy.com/login/callback?connection={instance_id}-production-saml&organization={instance_id}
- Sandbox:
- Set the identifier
- Click Save
- Download the Base64 Certificate from the SAML Signing Certificate box
- Copy the Login URL
Users access
Once an app is set up, it’s important to make sure the right users have access to the app. This is something that can be configured on the user profile, through a group, or through app properties. In either setup, it’s important to apply the following profile properties to the intended users.Detailed instructions for Azure pending.