Setting up Azure AD for SAML
Azure AD Configuration Steps
-
Log into your portal.azure.com account.
-
Navigate to Azure Active Directory.
-
Navigate to Enterprise Applications.
-
Select New Application.
-
Select Non-gallery application.
-
Give your new IdP application a name and click Add.
-
Click Single sign-on.
-
In the dropdown, select SAML-based Sign-on.
-
If you haven't done so already, download the Secret Server metadata file named
SecretServerSAMLMetadata.xml
from[YourSecretServerInstance.Name]/samlmetadata
:- In Secret Server, navigate to Administration.
- Type
SAML
in the combination box. The Section Matches section populates with sections matching what you typed. - Click the SAML Service Provider Settings link. The SAML Service Provider Settings page appears.
- Click the Download Service Provider Metadata (XML) button. The
SecretServerSAMLMetatdata.xml
file downloads to your browser's default location.
For more information on setting SAML up in Secret Server, please see See the Setting up Secret Server section in Configuring SAML Single Sign-on -
Click Upload metadata file and upload the Secret Server Metadata file you previously downloaded.
-
Click Save.
-
Scroll down and click Metadata XML to download the metadata for this application.
-
Go back to Azure Active Directory and click on App registrations.
-
Select your Azure Identity Provider (IdP) application.
If you don't see the application immediately, you might need to click View all Applications. -
Click Settings > Properties, then enter the Logout URL field for your instance. The form for this URL will be:
https://[YourSecretServerInstanceName]/saml/SLOService.aspx
. -
Click Save.
-
Return to the Configuration search box and type
Identity Providers
. -
Click on the Identity Providers link that appears in the Section Matches section. The SAML Identity Providers page appears.
-
Click the Create New Identity Provider button. The Identity Provider popup appears.
-
Click the New Identity Provider dropdown list and select Import IDP from XML Metadata. An Import File control appears.
-
Click the upload icon and select the XML file you downloaded earlier. If you do not see the file where it should be, ensure the file type is set to XML.
-
Click the OK button.
Adding Users to Single Sign-On in Azure AD
For users to be authenticated by the SSO workflow you are setting up, Secret Server usernames must match Azure AD usernames. If you manually add usernames to Secret Server or Azure AD, you must inspect them carefully to ensure that they match. You can also use Secret Server Discovery to sync Secret Server usernames in bulk with Azure AD usernames.
-
Log into your portal.azure.com account.
Navigate to Azure Active Directory > Enterprise Applications and select your IdP from the list
-
Select Users and groups and Add User.
-
Click Users and groups/None Selected.
-
Search for the user you want to add to your SAML workflow. (Note that any users added must also exist in your Secret Server instance. Usernames must match between the systems).
-
Click Select at the bottom, then Assign.
Once a username matches in both systems, the user should be able to use the Single Sign-On workflow. To test this, log into Azure AD as the user, then browse to your Secret Server instance. The user should be logged into Secret Server automatically without being prompted again for login credentials.
Advanced Settings
The following Secret Server Identity Provider Advanced Settings can be configured in Azure AD:
-
Require Signed SAML Response
-
Require Signed Assertion
-
Require Signed Assertion Or Signed SAML Response
Below are the steps to configure the settings in Azure Ad:
-
Log in to portal.azure.com.
-
Navigate to Azure Active Directory > Enterprise Applications.
-
Select your IdP, then click Single sign-on.
-
Scroll down and check the box for Show advanced certificate signing settings. checkbox.
-
Click the drop-down arrows to reveal options. These advanced options correspond with advanced options in Secret Server.
-
Click Advanced Settings next to your identity provider.
-
Require Signed SAML Response
-
Require Signed Assertion
-
Require Signed Assertion Or Signed SAML Response
-