Enable SSO with Microsoft Azure AD
Set up SSO with Microsoft Azure and configure settings to allow your users to access EveryoneSocial by authenticating with Azure.
🔸 An Enterprise account for a Microsoft Azure AD administrator is required to configure SSO.
🔹 This is available on the Enterprise and Unlimited User plan.
Create a new application and enable SSO
Follow Microsoft’s directions on how to create a new application and enable SSO.
Configure SAML SSO
Here is the basic SAML configuration information to enter in the respective fields in Microsoft Azure.
- Identifier (Entity ID): urn:amazon:cognito:sp:us-east-1_Njik3uRLR
- Reply URL (Assertion Consumer Service URL): https://auth.everyonesocial-prod.com/saml2/idpresponse
Sign on URL: https://YOUR_SUBDOMAIN.everyonesocial.app/sso
🔸 Update YOUR_SUBDOMAIN to the custom subdomain applied to your company’s Workspace.
User attributes and claims
We require an additional claim name to be mapped from the user's email address. See below. http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress
Value’s differ based on the Azure configuration. For example, EveryoneSocial uses SSO and we use the value “user.mail.” See below.
The overall configuration should look similar to the following image.
Test the SSO integration
Once these steps are complete, we will need two pieces of information.
- App Federation Metadata URL
- Federation Metadata XML file
Location the App Federation Metadata URL and click Copy. Find the Federation Metadata XML file and click Download.
Send these to EveryoneSocial Support. Once received, we will arrange a call where we can test the SSO integration before going live.
Trouble with the integration? Check out our Azure AD SSO troubleshooting article.