Setting Up SSO for ZPM with Azure IdP

 

 

About SAML Single Sign-On in ZPM

Single Sign-On can be setup in ZPM against any Identity Provider (IdP) which supports SAML 2.0.

This guide covers the steps required to setup SAML SSO for ZPM against Azure AD.

For an exhaustive list of supported IDP’s, visit SAML-based products and services.

Add Provisioning as an Enterprise Application in Azure

Wildcard Certificates are not supported for SSO.

  1. Connect to your Azure Portal.

  2. Search for Enterprise Applications and click the result.

     

  3. Click on +New Application

     

  4. Click Create your own application, provide a name (example ZIRO SSO) and select the 3rd option Integrate any other application you don't find in the gallery (Non-gallery)

 

The Enterprise Application is now added ✔

Download ZPM SP Metadata.

  1. Connect to your ZPM instance using the IP or the hostname.

  2. Navigate to the SAML Single Sign-On page available within the System Settings section of the admin menu.

     

  3. Click on the Export SP Metadata button and save the file. You will need it in the next section.

Configure the Enterprise Application for Single Sign-On

  1. Go back to the enterprise application you created in Azure in the first section and and click on Single Sign-On from the left vertical menu.

     

  2. Click on the SAML Single Sign-On method.

     

  3. Click on Upload metadata file

     

  4. Click on the folder icon and point to the ZPM SP Metadata to upload it.

  5. Once uploaded, a panel with your Basic SAML Configuration will appear on the right hand side which will be populated with values for your Identifier and Reply URL. Click Save.

     

  6. Once saved, click on the Download link next to Federation Metadata XML

     

Upload IdP Metadata to ZPM & Enable SSO

  1. Go to your ZIRO tenant, acces the SAML Single Sign-On Page from the vertical Admin menu.

     

  2. Click Import IdP Metadata and point the file you downloaded in the previous step from Azure.

     

  3. Click on the Enable Single Sign-On toggle.

Edit Attribute & Claims

  1. From the Enterprise Application you added in the previous steps, select Attributes & Claims from the left-hand vertical menu.

     

  2. Click on the ellipsis to modify the Unique User Identifier (Name ID)

     

  3. Change the default Name Identifier format and Source Attribute

    1. Name Identifier format should be set to Email address

    2. Source Attribute should be set to user.userprincipalname

       

  4. Click Save.

Add Users/Groups Requiring Access to Provisioning to your Enterprise Application

  1. From the Enterprise Application you added in the previous steps, select Users and groups from the left-hand vertical menu.

     

  2. Click on + Add user/group

     

  3. Click on None Selected

     

  4. A search panel will appear on the right hand side. Use it search for and select the individual users or groups who should be able to log into your Provisioning tenant via Single Sign-On and click Select.

     

Test Single Sign-On from Azure

  1. Return to the Single Sign-On section of your newly added Enterprise Application and click Test at the bottom of the page.

  2. A panel will appear with testing options on the right hand side of the page, select Sign in as current user option and click Test sign in.

     

  3. If you completed the previous steps correctly, you will be presented with the Provisioning home screen.