Setting up Microsoft Entra ID (SAML)

Setting up Microsoft Entra ID (SAML)

To configure Entra ID as an identity fabric, you will need the App federation metadata URL, as well as the entity ID. You’ll need to register an enterprise application in Entra ID by doing the following:

  1. In your Microsoft Entra tenant, go to Enterprise applications and select New Application. In the Microsoft Entra gallery, search for Maverics Identity Orchestrator SAML Connector and select it.
  2. On the Maverics Identity Orchestrator SAML Connector Properties pane, set User assignment required? to No to enable the application to work for all users in your directory.
  3. On the Maverics Identity Orchestrator SAML Connector Overview pane, select Set up single sign-on, and then select SAML.
  4. On the Maverics Identity Orchestrator SAML Connector SAML-based sign on pane, edit the Basic SAML Configuration by selecting the Edit (pencil icon) button.
  5. Enter an Entity ID of https://sonar.maverics.com. The entity ID must be unique across the apps in the tenant, and it can be an arbitrary value.
  6. Enter a Reply URL of https://sonar.maverics.com/acs.
  7. Enter a Sign on URL of https://sonar.maverics.com/. This field won’t be used by Maverics, but it is required in Microsoft Entra ID to enable users to get access to the application through the Microsoft Entra My Apps portal.
  8. Select Save.
  9. In the SAML Signing Certificate section, click the Copy button to copy the App Federation Metadata URL value.