Microsoft My Apps-SSO
Configure Single Sign-On using Microsoft My Apps for streamlined authentication.
Last updated
Configure Single Sign-On using Microsoft My Apps for streamlined authentication.
Last updated
Single Sign-On (SSO) allows users to access multiple applications with a single set of credentials, enhancing security and usability. This guide provides step-by-step instructions on how to configure SSO for an application in Microsoft My Apps using Azure Active Directory (Entra ID).
Before proceeding, ensure you have:
Admin access to Azure Active Directory (AAD)
An existing application in Azure (or the ability to create one)
SSO configuration details from the E6data platform (Entity ID, Reply URL)
Open a web browser and go to the .
Sign in using an administrator account.
2. Access Enterprise Applications
In Azure Services, click Enterprise Applications.
A list of all existing enterprise applications appears.
3. Create a New Application
Click New Application.
On the Browse Azure AD Gallery page, select Create your own application.
In the Create your own application dialog box:
Enter a name for the application (e.g., demo123).
Select Integrate with a non-gallery application.
Click Create.
The application is added to the list of enterprise applications.
In the Getting Started pane, locate the Set up single sign-on card and click Get Started.
The Select a single sign-on method page appears. Click SAML.
On the SAML-based Sign-on page, click Edit under Basic SAML Configuration.
In the Basic SAML Configuration page:
Identifier (Entity ID) – Copy and paste the Audience URI (SP Entity ID) from the E6data SSO page.
Reply URL (Assertion Consumer Service URL) – Copy and paste the Single Sign-On URL from the E6data SSO page.
Click Save.
6. Configure Attributes & Claims
Close the Basic SAML Configuration page.
On the SAML-based Sign-on page, locate the Attributes & Claims section and click Edit.
Click Add new claim and set the following attributes:
Full Name
Click Save.
7. Download the Federation Metadata XML
On the SAML Certificates card, locate Federation Metadata XML and click Download.
The browser will download the Azure metadata file.
Go to the E6data platform.
Upload the Federation metadata.xml file downloaded from Azure.
Click Next to complete the setup.
9. Assign Users to the Application
After configuring SSO, you need to assign users who should have access to the application.
Go to the Enterprise Application
In the Azure Portal, navigate to Enterprise Applications.
Select the application you just created (e.g., demo123).
Open the Users and Groups Section
In the left-hand menu, click Users and Groups.
Click Add user/group.
Assign Users or Groups
Click Users and select the users who need access.
If needed, assign a role (default is "User").
Click Assign to save the changes.