Configure Azure AD
BluBracket supports single sign-on and federated identity services with Azure Active Directory using SAML. This article covers configuring the BluBracket app in Azure AD, configuring the Azure AD SAML federation in BluBracket, and managing users.
Once single sign-on is configured as described below, authentication, passwords, and two-factor authentication are managed and configured in Azure AD.
However, users must be registered in both BluBracket and Azure AD. Removing a user from either Azure or BluBracket will terminate their access to BluBracket. Additionally, the email address for each user in BluBracket must match the email address in Azure AD.
BluBracket requires an email attribute in order to successful identify and authenticate users; BluBracket looks for this value from the SAML identity claim http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress
.
Register the BluBracket app in Azure Active Directory
- Login to Azure AD as an Administrator https://portal.azure.com
- Select the Azure Active Directory service
- Select Enterprise applications
- Select + New application
- Select Application you’re developing
- Select the link Ok, take me to App Registrations to register my new application
- Select + New registration.
- Register the Application
- App name: BluBracket
- Select the appropriate radio button for who can use this application
- Specify the Redirect URI
- Type: Web
- URI:
https://TENANT_NAME.blubracket.com/api/saml/sso
(Be sure to replaceTENANT_NAME
with the name of your tenant name provided by BluBracket)
- Select Register
Get the federation metadata document URL from Azure AD
- Navigate to Azure Active Directory portal .
- Under Manage, select App registrations, and then select Endpoints in the top menu, then copy and save the Federation metadata document.
- Select the BluBracket application
- Copy and save the Application (client) ID
Set the SAML federation metadata document URL and client ID in BluBracket
- Navigate to
https://TENANT_NAME.blubracket.com/settings/auth
(Be sure to replaceTENANT_NAME
with the name of your tenant name provided by BluBracket). - Enter the federation metadata document URL.
- Enter the Application (client) ID from step 15
Grant permissions to users in Azure AD to use BluBracket
- Navigate to Enterprise applications in the Azure portal.
- Select the BluBracket application
- Add users:
- Select Users and groups, and then select Add user.
- On Add Assignment, select Users and groups to open the Users and groups selection list.
- Select as many groups or users as you want, then click or tap Select to add them to the Add Assignment list. You can also assign a role to a user at this stage.
- Select Assign to assign the users or groups to the selected enterprise application
Add users in BluBracket
Tenant administrators must add users to their BluBracket tenant prior to login via single sign-on. Full details are here .
Test the Azure AD/SAML configuration
Open https://TENANT_NAME.blubracket.com
in a new private browser window or open a different browser to test the Single Sign-on changes (Be sure to replace TENANT_NAME
with the name of your tenant name provided by BluBracket). The login page should automatically redirect to Azure AD, if Azure AD authentication is successful, the user will then be redirected back to BluBracket and logged into the tenant.