Console terminology: In the Maverics Console, this section is called
Identity Fabric. The YAML configuration uses the
connectors key to define
identity provider integrations.Overview
The Microsoft Entra ID (SAML) connector supports SAML 2.0 SSO profiles including SP-initiated and IdP-initiated flows. For most deployments, the Microsoft Entra ID (OIDC) connector is recommended as the more common integration path. Use the SAML variant when your environment requires SAML-based federation or when integrating with applications that only support SAML assertions.Use Cases
- Unify SSO for SAML-dependent applications — Connect to Entra ID via SAML when legacy applications or compliance policies require SAML 2.0 federation instead of OIDC
- Consolidate IdPs around Entra ID — Route authentication from multiple legacy IdPs to Entra ID using SAML, reducing the number of identity platforms and associated licensing costs
- Multi-protocol orchestration — Combine Entra ID SAML with other SAML or OIDC connectors to deliver unified access across hybrid environments without rewriting applications
- Entra ID failover with Continuity — Pair Entra ID SAML with a secondary IdP to maintain authentication availability during Entra ID service disruptions
Configuration
- Console UI
- Configuration
To create a Microsoft Entra ID (SAML) connector in the Maverics Console:
- Navigate to Identity Fabric in the Console sidebar.
- Click Create and select Microsoft Entra ID (SAML).
The Console also offers Microsoft Entra ID (OIDC) for OpenID Connect-based integration, which is the more common option. See the Entra ID (OIDC) page for details.
- Enter a Name — the friendly name for your Entra ID SAML provider.
- Enter the Metadata URL — the URL of the Entra ID SAML metadata document (e.g.,
https://login.microsoftonline.com/{tenant-id}/federationmetadata/2007-06/federationmetadata.xml). - Enter the Consumer Service (ACS) URL — the Assertion Consumer Service URL where Entra ID sends SAML responses.
- Enter the Entity ID — the unique identifier for the Orchestrator as the SAML Service Provider.
- Optionally enter a Logout Callback URL for Single Logout (SLO) callback.
- Optionally enter the SP Certificate Path and SP Private Key Path for signing SAML requests.
- Optionally enable IdP Initiated Login to allow authentication flows started by Entra ID.
- Click Save.
Troubleshooting
- Verify the Entra ID metadata URL is accessible — The Orchestrator fetches the federation metadata XML at startup. Replace
{tenant-id}with your Microsoft Entra ID directory (tenant) ID from the Azure portal. - Ensure the entity ID matches the Entra ID enterprise application — The
samlEntityIDvalue must match the Identifier (Entity ID) configured in the Entra ID enterprise application’s SAML configuration. - Check the Assertion Consumer Service URL — The
samlConsumerServiceURLmust match the Reply URL (Assertion Consumer Service URL) configured in the Entra ID enterprise application. If behind a load balancer, use the external-facing URL. - SP signing certificate errors — If the Entra ID application requires signed authentication requests, ensure
samlSPCertPathandsamlSPKeyPathpoint to valid PEM files and the key matches the certificate.