{% include plans-blockquote.html feature="SAML authentication" %}
...
...
@@ -12,9 +13,9 @@ redirect_from:
First, follow our guide to [enable SAML authentication](authenticating-with-saml.md).
## Add an Enterprise Application in Azure AD
## Add an Enterprise Application in Microsoft Entra ID
Go to the Azure Active Directory (AD) where your users live and click on **Enterprise Applications**. Once there, click on **+ New Application** in the bar on the top of the page.
Go to Mircrosoft Entra admin center and click on **Enterprise Applications** under Applications from the side bar. Once there, click on **+ New Application** in the bar on the top of the page.
@@ -35,14 +36,14 @@ Fill out the following fields as follows and click "Save":
-**Identifier (Entity ID)**: `Metabase`
-**Reply URL (Assertion Consumer Service URL)**: go to your Metabase instance in Settings -> Admin-> Authentication -> SAML and insert the value that your Metabase instance reports in the "Configure your identity provider (IdP)" box.
In a new tab, visit the "App Federation Metadata URL". On the Metadata page, note the:
In a new tab, visit the "App Federation Metadata URL" found in step 3, "SAML Certificates". On the Metadata page, note the:
- "Login URL"
- "Azure AD Identifier"
- "Microsoft Entra Identifier"
You'll need these URLs to complete the SSO setup in Metabase.
To finish the Azure side of the configuration, click on the **Users and groups** button on the Manage tab and add the users or groups that should have access to Metabase.
To finish the Microsoft Entra side of the configuration, click on the **Users and groups** button on the Manage tab and add the users or groups that should have access to Metabase.
## Configure the Enterprise Application with Metabase SSO information
...
...
@@ -50,9 +51,9 @@ Log in to Metabase as an administrator and go to **Admin** -> **Settings** -> **
Under "Tell Metabase about your identity provider", enter the following:
-**SAML Identity Provider URL**: the "Login URL" you got on Step 4 on the Azure AD SAML SSO configuration
-**SAML Identity Provider URL**: the "Login URL" you got on Step 4 on the Microsoft Entra ID SAML SSO configuration
-**SAML Identity Provider Certificate**: copy and paste the super long string under the `<X509Certificate>` tag in the "App Federation Metadata Url". Make sure you copy and paste the whole string; if you miss any character, the integration won't work.
-**SAML Application Name**: "Metabase"
-**SAML Identity Provider Issuer**: the "Azure AD Identifier" URL you got from the Azure AD SAML SSO configuration.
-**SAML Identity Provider Issuer**: the "Microsoft Entra Identifier" URL you got from the Microsoft Entra ID SAML SSO configuration.
Click on **Save Changes** below, and you should now be able to log in via Azure AD.
Click on **Save Changes** below, and you should now be able to log in via Microsoft Entra ID.