Microsoft Azure AD Enterprise Connection
Microsoft Entra ID (formerly Azure AD) can federate users to AuthAction using SAML.
ACS URL
Section titled “ACS URL”In the enterprise application’s SAML configuration, set the Reply URL (Assertion Consumer Service URL) to:
https://<tenant-name>.<region>.authaction.com/oauth2/saml/callbackSet the Identifier (Entity ID) to your AuthAction tenant URL.
Fields to copy into AuthAction
Section titled “Fields to copy into AuthAction”| Field in AuthAction | Where to find |
|---|---|
| IdP SSO URL | Azure Portal > Enterprise applications > your app > Single sign-on > Login URL |
| Entity ID / Issuer | Same page > Azure AD Identifier |
Step 1: Create an enterprise application
Section titled “Step 1: Create an enterprise application”- In Azure Portal, go to Microsoft Entra ID > Enterprise applications.
- Click New application > Create your own application.
- Choose Integrate any other application you don’t find in the gallery (Non-gallery).
- Open Single sign-on and select SAML.
- Edit Basic SAML Configuration:
- Reply URL: your AuthAction ACS URL.
- Identifier: your AuthAction tenant URL.
- Ensure User Attributes include a name identifier suitable for your app (often email).
Step 2: Configure Azure AD in AuthAction
Section titled “Step 2: Configure Azure AD in AuthAction”- In AuthAction, go to Connections > Enterprise Connections.
- Select Microsoft Azure AD (or the equivalent label in the dashboard).
- Enter Login URL as the IdP SSO URL and Azure AD Identifier as the Entity ID / Issuer.
- Add the Signing Certificate from Azure’s SAML metadata if needed.
- Save.
Step 3: Assign users and test
Section titled “Step 3: Assign users and test”Assign users or groups to the enterprise application in Azure, enable the connection in AuthAction for your apps, and verify sign-in.