Setting up Microsoft Entra for SAML-based Single Sign-On (SSO)
Who is this article for?
Administrators responsible for managing organization security settings in Ideagen Hub.
Admin Console access is required.
You can set up Microsoft Entra as your corporate identity provider (IdP) in Ideagen Hub using SAML or OIDC. To use an external identity provider like Microsoft Entra, you will need to ensure the Hub user's authentication type is set to External.
This article outlines how to configure a new SAML app in Microsoft Entra and link it to Ideagen Hub.
1. Creating an SAML app
To create a SAML app in Microsoft Entra:
- Log in to to the Entra portal.
- Navigate to Enterprise applications.
- Click New Application.
- Click Create your own application.
- Enter a name for your app.
- Select the Integrate any other application you don't find in the gallery option.
Select SAML from the method options.
2. Configuring the SAML app
2.1. Identifier and Reply URL
To configure the Identifier and Reply URLs:
- Sign in to Ideagen Hub.
- Navigate to the Admin Console.
- Go to the Security Center.
- Select Authentication.
- Select Eternal IDP Configuration.
- Click Add Identity Provider.
- Select SAML.
- Click Next.
You will see the Identifier (Entity ID) and Reply URL (Assertion Consumer Service URL). - Copy these values to your identity provider app.
2.2. Provider name
In Ideagen Hub, you may proceed to set up the required Provider name. This will be a friendly name that will be displayed as the button label for your corporate ID on the Ideagen Hub login page.
2.3. Metadata document endpoint
To configure the metadata document endpoint URL:
- Go to the Entra portal.
- Copy the App Federation Metadata URL.
- Go back to Ideagen Hub.
- Scroll to the Metadata document source section.
- Paste the link in the Enter metadata document endpoint URL field.
- Click Apply Configuration.
4. Adding users/groups
By default, no users will be able to log in using the Microsoft Entra Enterprise application until they are explicitly assigned access.
To grant access:
Go to the application in the Entra portal.
Navigate to Manage, Users and groups.
Click Add user/group.
Select the relevant users/groups.
Click Assign.
5. Configuring attribute mapping
5.1 Email attribute
Whether your organisation uses Email or Username as the login identifier, you will need to add the email attribute in Microsoft Entra and map the email attribute in Ideagen Hub.
To configure the attribute:
Go to the application in the Entra portal.
Scroll to Attributes & Claims.
Click Edit.
- Copy the pre-configured or custom claim.
- Go to Ideagen Hub.
- Scroll down to the Attribute mapping section.
- Paste the claim name in the SAML attribute field next to the email User pool attribute.
5.1.1. Pre-configured claim
By default, Microsoft Entra ID's Enterprise application includes a pre-configured claim that is mapped to user.mail.
If you wish to use this default claim, copy its claim name. This value will be used later to map to the email user pool attribute in Ideagen Hub.
5.1.2. Custom claim
You can also use any other custom claims that is mapped to an email value that is not included in the default claims provided by Microsoft Entra.
To create a new claim:
Click Add new claim.
Enter a Name for the claim.
Ensure you select a Source attribute that will return the user's email address (e.g., user.mail).
Click Save.
Once saved, the newly created claim will be listed under Additional claims.
To use this custom claim, copy its claim name. This value will be used later to map to the email user pool attribute in Ideagen Hub.
5.2. Username attribute
If your organisation uses Username as login identifier, you must map the email and preferred_username attributes in Ideagen Hub.
To configure the attribute:
Go to the application in the Entra portal.
Scroll to Attributes & Claims.
Click Edit.
- Copy the pre-configured or custom claim.
- Go to Ideagen Hub.
- Scroll down to the Attribute mapping section.
- Paste the claim name in the SAML attribute field next to the preferred_username User pool attribute.
5.2.1. Pre-configured claim
By default, Microsoft Entra ID's Enterprise application includes a pre-configured claim that is mapped to user.userprincipalname. Assuming that user.userprincipalname contains a unique value for each user, you can copy the default claim name to be mapped to the preferred_username attribute in Ideagen Hub.
5.2.2. Custom claim
You can also use any other unique value that is not included in the default claims provided by Microsoft Entra as the preferred username.
For example, if your organisation uses Employee ID as a unique identifier, you can create a custom claim to map Microsoft Entra's Employee ID to the preferred_username user pool attribute in Ideagen Hub.
To create a new claim:
Go to the application in the Entra portal.
Scroll to Attributes & Claims.
Click Edit.
Click Add New claim.
Enter a Name for the claim.
Ensure you select a Source attribute that will return the user's email address (e.g., user.employeeid).
Click Save.
Once saved, the newly created claim will be listed under Additional claims.
To use this custom claim, copy its claim name. This value will be used later to map to the preferred_username user pool attribute in Ideagen Hub.
6. Signing SAML response
When you sign SAML requests, your IdP can verify that a request has the expected signature. You will need to configure this in Ideagen Hub and Microsoft Entra.
6.1. Ideagen Hub
To enable this in Ideagen Hub:
- Access the SAML Configuration.
- Tick Sign SAML requests to this provider.
The signing certificate will be available at the top section for download.
6.2. Microsoft Entra
To enable this in Microsoft Entra:
- Go to the Entra portal.
- Open the application.
- Navigate to Single Sign-On.
- Scroll to the Verification certifications.
- Click Edit.
- Tick Require Verification certificates
- Upload the signing certificate downloaded from Ideagen Hub’s SAML Configuration.
- Click Save.
7. Single Sign-Out error
Although Ideagen Hub's external IdP configuration allows for single sign-out to be enabled, this feature doesn't work when the Identity Provider (IdP) is Microsoft Entra ID.
This is because Ideagen Hub's authentication provider, AWS Cognito, only supports POST requests for single sign-out, whereas Entra ID only supports GET requests, leading to an incompatibility between the two services.