Step 1: Setup Microsoft Entra ID
1.1 Login to Azure Portal and go to Microsoft Entra ID > Enterprise Applications
1.2 Create SAML application
Click Create New application (see above image) > Create your own application > Make sure you select “Integrate any other application you don’t find in the gallery (Non-gallery)“
1.3 Configure Single sign-on SAML
You will see the below screen after clicking on the SAML
option
Edit “Basic SAML Configuration”
Add identifier (Entity ID):
Use this placeholder value
urn:auth0:ansarada:placeholder-will-update-later
Ansarada will provide the correct value in the later step
Add reply URL
Use this placeholder value
https://auth.au.ansarada.com/login/callback?connection=placeholder-will-update-later
Ansarada will provide the correct value in the later step
Setup Basic SAML Configuration
Use placeholder values
Step 2: Share SSO setting with Ansarada Team
Send an email to Ansarada Customer Success ([email protected]) with the following information
App Federation Metadata Url
Certificate (Base64)
Step 3: Correct the Identifier (Entity ID) and Reply URL
When Ansarada completes configuring the SSO on our side, we will send back to you the following information, you can finalize the configuration on your side.
Identifier (Entity ID)
Reply URL
Update Basic SAML Configuration
Step 4: Testing
After completing all the above steps, we will set up a video call to test SSO. Please be aware that:
Ansarada enables SSO by email domain(s), once we turn on SSO, all users will be required to log in via SSO. The users who are already logged in can continue the work and the SSO will trigger for the next login.
Ansarada doesn’t have a test environment for customers to test SSO
We can switch on/off very quickly, around 2 or 3 minutes
To avoid the impact, we recommend performing the test during quiet hours, ideally after working hours.