Skip to content
Snippets Groups Projects
Unverified Commit fcf8c51c authored by Abed Habli's avatar Abed Habli Committed by GitHub
Browse files

Rename Azure AD to Microsoft Entra ID (#45863)

* Rename Azure to Microsoft Entra ID

* adding a new screenshot
parent b354780c
No related branches found
No related tags found
No related merge requests found
docs/people-and-groups/images/saml-azure-ad-enterprise-app.png

70.7 KiB | W: | H:

docs/people-and-groups/images/saml-azure-ad-enterprise-app.png

222 KiB | W: | H:

docs/people-and-groups/images/saml-azure-ad-enterprise-app.png
docs/people-and-groups/images/saml-azure-ad-enterprise-app.png
docs/people-and-groups/images/saml-azure-ad-enterprise-app.png
docs/people-and-groups/images/saml-azure-ad-enterprise-app.png
  • 2-up
  • Swipe
  • Onion skin
---
title: SAML with Azure AD
title: SAML with Microsoft Entra ID
redirect_from:
- /docs/latest/enterprise-guide/authenticating-with-saml-azure-ad
---
# SAML with Azure AD
# SAML with Microsoft Entra ID
{% include plans-blockquote.html feature="SAML authentication" %}
......@@ -12,9 +13,9 @@ redirect_from:
First, follow our guide to [enable SAML authentication](authenticating-with-saml.md).
## Add an Enterprise Application in Azure AD
## Add an Enterprise Application in Microsoft Entra ID
Go to the Azure Active Directory (AD) where your users live and click on **Enterprise Applications**. Once there, click on **+ New Application** in the bar on the top of the page.
Go to Mircrosoft Entra admin center and click on **Enterprise Applications** under Applications from the side bar. Once there, click on **+ New Application** in the bar on the top of the page.
![AZEnterpriseApp](images/saml-azure-ad-enterprise-app.png)
......@@ -35,14 +36,14 @@ Fill out the following fields as follows and click "Save":
- **Identifier (Entity ID)**: `Metabase`
- **Reply URL (Assertion Consumer Service URL)**: go to your Metabase instance in Settings -> Admin-> Authentication -> SAML and insert the value that your Metabase instance reports in the "Configure your identity provider (IdP)" box.
In a new tab, visit the "App Federation Metadata URL". On the Metadata page, note the:
In a new tab, visit the "App Federation Metadata URL" found in step 3, "SAML Certificates". On the Metadata page, note the:
- "Login URL"
- "Azure AD Identifier"
- "Microsoft Entra Identifier"
You'll need these URLs to complete the SSO setup in Metabase.
To finish the Azure side of the configuration, click on the **Users and groups** button on the Manage tab and add the users or groups that should have access to Metabase.
To finish the Microsoft Entra side of the configuration, click on the **Users and groups** button on the Manage tab and add the users or groups that should have access to Metabase.
## Configure the Enterprise Application with Metabase SSO information
......@@ -50,9 +51,9 @@ Log in to Metabase as an administrator and go to **Admin** -> **Settings** -> **
Under "Tell Metabase about your identity provider", enter the following:
- **SAML Identity Provider URL**: the "Login URL" you got on Step 4 on the Azure AD SAML SSO configuration
- **SAML Identity Provider URL**: the "Login URL" you got on Step 4 on the Microsoft Entra ID SAML SSO configuration
- **SAML Identity Provider Certificate**: copy and paste the super long string under the `<X509Certificate>` tag in the "App Federation Metadata Url". Make sure you copy and paste the whole string; if you miss any character, the integration won't work.
- **SAML Application Name**: "Metabase"
- **SAML Identity Provider Issuer**: the "Azure AD Identifier" URL you got from the Azure AD SAML SSO configuration.
- **SAML Identity Provider Issuer**: the "Microsoft Entra Identifier" URL you got from the Microsoft Entra ID SAML SSO configuration.
Click on **Save Changes** below, and you should now be able to log in via Azure AD.
Click on **Save Changes** below, and you should now be able to log in via Microsoft Entra ID.
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment