Set up SAML with Microsoft Azure Active Directory ================================================= This article explains how to set up SAML with `Microsoft Azure Active Directory (AD) `_ for an organization in Aiven. For more information on SAML and instructions for other identity providers, see the :doc:`Set up SAML authentication ` article. Prerequisite steps in Aiven Console ------------------------------------ #. In the organization, click **Admin**. #. Select **Identity providers**. #. Click **Add identity provider**. #. Enter a name and select SAML. You can also select the groups that users will be added to when they sign up or log in through this authentication method. You are shown two parameters needed to set up the SAML authentication in Microsoft Azure AD: * Metadata URL * ACS URL Configure SAML on Microsoft Azure ---------------------------------- First, you set up the application on Azure. Then, you add a claim and users. Set up an Azure application """""""""""""""""""""""""""" 1. Log in to `Microsoft Azure `_. 2. Got to **Enterprise applications**. 3. Select **All applications**. 4. Click **New application**. 5. Select the **Add from the gallery** search bar and use the **Azure AD SAML Toolkit**. 6. Click **Add**. 7. Go back to the **Enterprise applications** list. .. note:: The newly created application might not be visible yet. You can use the **All applications** filter to see the new application. 8. Click on the name of the new application. The configuration opens. 9. Select **Single sign-on** configuration. 10. Select **SAML** as the single sign-on method. 11. Add the following parameters to the **Basic SAML Configuration**: .. list-table:: :header-rows: 1 :align: left * - Parameter - Value * - ``Identifier (Entity ID)`` - ``Metadata URL`` * - ``Reply URL (Assertion Consumer Service URL)`` - ``ACS URL`` * - ``Sign on URL`` - ``https://console.aiven.io`` 12. Click **Save**. Create a claim and add users """""""""""""""""""""""""""" 1. In the **User Attributes & Claims**, click **Add a new claim**. 2. Create an attribute with the following data: .. list-table:: :header-rows: 1 :align: left * - Parameter - Value * - ``Name`` - ``email`` * - ``Source`` - ``Attribute`` * - ``Source Attribute`` - ``user.mail`` 3. Download the **Certificate (Base64)** from the **SAML Signing Certificate** section. 4. Go to **Users and groups** and click **Add user**. 5. Select the users that you want to use Azure AD to log in to Aiven. 6. Click **Assign**. Finish the configuration in Aiven ---------------------------------- Go back to the **Authentication** page in `Aiven Console `_ to enable the SAML authentication method: 1. Select the name of the Azure AD method that you created. 2. In the SAML configuration section, click **Edit**. 3. Add the configuration settings from Azure: * Set the ``SAML IDP URL`` to the ``Login URL`` from Azure. * Set the ``SAML Entity ID`` to the ``Azure AD Identifier`` from Azure. * Paste the certificate from Azure into the ``SAML Certificate`` field. 4. Click **Edit method** to save your changes. 5. Toggle on **Enable authentication method** at the top of the page. 6. In the **Signup and link accounts URLs** section, copy the appropriate link and send it to your users to switch them to the new IdP: * **Signup URL**: For users that don't have an Aiven user account and need to create a new Aiven user linked to this IdP. * **Account link URL**: For users that already have an Aiven user account to link their existing Aiven user with the configured IdP. .. note:: If you set up a SAML authentication method before and are now switching to a new IdP, existing users need to log in with the new account link URL to finish the setup. Troubleshooting --------------- Error: contact your administrator """"""""""""""""""""""""""""""""" If you get an error message suggesting you contact your administrator, try these steps: #. Go to the Microsoft Azure AD user profile for the users. #. In **Contact Info**, check whether the **Email** field is blank. If it is blank, there are two possible solutions: * In **User Principal Name**, if the **Identity** field is an email address, try changing the **User Attributes & Claims** to ``email = user.userprincipalname``. * In **Contact Info**, if none of the **Alternate email** fields are blank, try changing the **User Attributes & Claims** to ``email = user.othermail``. If you still have login issues, you can use the `SAML Tracer browser extension `_ to check the process step by step. If this doesn't work, get in touch with our support team at support@Aiven.io.