Using Microsoft Azure as an external Identity Provider (IdP) for Awingu

0 users found this article helpful

 

Resolution

To successfully use Microsoft Azure as an external Identity Provider (IdP) for Awingu, it's important that the username claim returns the user principal name (UPN) in the LDAP environment, which is most commonly an Active Directory (AD).

 

Configuring Awingu: host headers

This needs to be configured per Awingu domain.

First, go to System Settings > Global > Domains. Select the Awingu domain for which this authentication flow will be configured. Validate what is specified for host headersIt should contain the host header that will be used to access the Awingu environment. In this guide, this will be awingu.somedomain.org .

Microsoft Azure will only allow URLs using https; so make sure there is an SSL certificate configured in Awingu for this Awingu domain.

 

Creating Azure Enterprise Application

Log in to portal.azure.com and locate Enterprise Applications.
Click [ + Create your own application ].

 

Give the application a name of your choice. Leave the radio button set to "Integrate any other application you don't find in the gallery (Non-gallery)".

Confirm by pressing [Create].

After a bit, the properties of the Enterprise Application should be shown.
In the left navigation menu, choose Single sign-on.

 

Choose SAML:


This will need to be completed step by step.
In the Basic SAML Configuration, click on Edit.

 

Basic SAML Configuration

Click [Save].

Attributes & claims

Mind that the user principal name (UPN) is used as the link between the Azure user and the LDAP user. 
If the user happens to have a different UPN on Microsoft Azure, the username claim will need to be adjusted as below. 

Click Edit next to Attributes & claims.

 

In most configurations, the claim http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name is used [...]. By default, this returns the user principal name of the Azure user.

When this does not match the UPN of the LDAP user, there are two options:

  1. Click the claim name and change the source attribute to something else, for example: user.extensionattribute1 
  2. Click [ + Add new claim ] to add an entirely custom claim.
    • Name: Can be anything. For example: customatt
    • Namespace: Can be left blank.
    • Name format: Don't change, leave to default.
    • Source: Depends on the use case. Most commonly: point to an Attribute and set Source attribute to the attribute (on the Azure AD) in which the user principal name of the local Active Directory will be stored. Do not forget to make sure this field is populated with the local UPN for the users who will be using Awingu.

Click Save.

Configuring users and groups

Click Users and groups. Select all the users and groups who should have access to Awingu.

Grabbing federation metatadata URL

Click Single sign on. 

Under step 3, locate the App Federation Metadata URL
Copy this value, it's needed in the Awingu configuration.

 

 

Configuring Awingu: Federated Authentication

In Awingu's System Settings, after making sure the relevant domain is selected in the top left: 

Navigate to System Settings > Configure > User Connector.

  1. Under Reverse Proxy, verify the default login host header is set to the host header which end users will use to access this Awingu domain (e.g. awingu.somedomain.org ).
  2. Under Federated Authentication:
    1. Set the Type to Pre-Authentication. (Note: This article is limited to the instructions to set up Pre-Authentication, but these steps are the same when setting up Single Sign-On (SSO). SSO requires additional steps though.)
    2. Set the Protocol to SAML.
      • Entity ID: Can be anything, for example: Awingu-Guide-Custom-Username-Claim 
    3. Set the Metadata Type to URL. Paste the URL found in the Enterprise Application's Single Sign On Settings. It should look like this: https://login.microsoftonline.com/<unique_id>/federationmetadata/2007-06/federationmetadata.xml?appid=<app_id>
    4. It's recommended to enable Single Logout.
    5. Change the Username claim.
      • Default: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
      • When using a custom claim: use the claim name, for example: customatt
    6. Display Name Claim: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/givenname
    7. Workspace URL: This will be used to construct the ACS URL for the Authentication Provider. In most scenarios, this is the host header which end users will use to access this Awingu domain. For example: https://awingu.somedomain.org 
    8. Click [Apply].

Note: the URLs will update each time the "Workspace URL" value has been saved.

Click Apply.

 

 

Additional hints

If Azure AD Connect (AADConnect) is being used to synchronize users from local Active Directory to Azure AD:
Set up a custom rule as described here: https://learn.microsoft.com/en-us/azure/active-directory/hybrid/how-to-connect-sync-change-the-configuration

 

There's also a technical video available.

Was this article helpful?

Tell us how we can improve it.