10.3.4    Configure Azure Active Directory with SAML 2.0 Protocol

This section provides a sample configuration of the Azure with SAML 2.0 protocol.

Note: This document assumes your organization already has Directory Integrations set up with your Active Directory.

To configure Azure with SAML 2.0 protocol:

1.       Log in to azure portal as administrator ( https://portal.azure.com).

2.      Go to Azure Active Directory > App registrations, then click New application registration.

3.       Enter name of the application (for example Anju), select Web App/API for the Application Type, enter https://{TrialMaster or AnjuEDC_url}/Account/Saml  as Sign-on URL , where {TrialMaster or AnjuEDC_url}  URL is specific to TrialMaster or AnjuEDC, and then click Create.

4.      Navigate to the new application and copy the Application ID, which will be stored in table Authentication URL in column ExternalServiceId.

5.       Go back to App registrations and click the Endpoints button.

6.      Copy FEDERATION METADATA DOCUMENT URL (e.g.  https://login.microsoftonline.com/{Directory_ ID}/federationmetadata/2007-06/federationmetadata.xml) and browse to it. The XML metadata document displays.

Go to:

<IDPSSODescriptor protocolSupportEnumeration="urn:oasis:names:tc:SAML:2.0:protocol"> element and copy the first <X509Certificate> element value.

This value is the token signing certificate in PEM format, which should be surrounded with -----BEGIN CERTIFICATE----- and -----END CERTIFICATE----- text and saved in AuthenticationURLs table in the Certificate column. Then copy link of SAML-P Sign-On Endpoint and store it in URL column of AuthenticationURLs table.