Skip to main content
Version: Cloud

Configure Microsoft Entra ID with SAML

DISCLAIMER


This page contains third-party references. We strive for our content to always be up-to-date, however, the content referring to external vendors may change independently of Omada. If you spot any inconsistency, please report it to our Helpdesk.

Below, you will learn how to perform a successful app registration to configure SAML as the authentication type and Entra ID as the provider in Omada Identity.

Microsoft Entra ID with SAML

To configure Microsoft Entra ID with SAML:

  1. Log in to the Azure Portal and select Microsoft Entra ID.

    Azure Portal: Microsoft Entra ID
  2. On the left pane menu, select App registrations.

    Azure Portal: App registrations
  3. From the menu on the top, select + New registration.

    Azure Portal: New registration

    An application registration window opens:

    Azure Portal: application registration
  4. Type a user-facing display name for the application (in this example: SAML).

  5. Under Supported account types, select Accounts in the organizational directory only.

  6. Provide a Redirect URI, following the example on the screenshot above.

    info

    An authentication response will be returned to this URI after successfully authentication the user.

  7. Click Register.

  8. Record the values you will need later:

    1. Go to the Overview section of the new app registration and record the Application ID.

      Azure Portal: record Application ID
    2. Go to the Endpoints menu from the list of app registrations.

      Azure Portal: Endpoints menu

      Record the Federation metadata document.

      Azure Portal: record Federation metadata document
    info

    You will need the recorded data in the next sections either to check if they got calculated correctly in Omada Identity or to paste them manually, depending on the solution of your choice.

You have now performed a successful SAML app registration. Next, you need to configure the application.

Configuring SAML from Enterprise applications

  1. In the Azure Portal, select Microsoft Entra ID.

    Azure Portal: Microsoft Entra ID
  2. On the left pane menu, select Enterprise applications.

    Azure Portal: Enterprise applications
  3. From the list of applications, select the application you need. In this example, it is saml.omadadev.cloud.

  4. In the Manage section of the left menu, select Single sign-on.

  5. Select Edit in the Basic SAML Configuration section for an editing view to open on the right-hand side.

    Azure Portal: basic SAML configuration menu
  6. Make sure the basic SAML configuration is filled with the correct data, following the example. (If you are doing it for the first time, the fields should be editable for you.)

    Azure Portal: basic SAML configuration details
    tip

    For an example from the official Microsoft documentation, see Configure single sign-on in the tenant.

  7. Select Edit in the Basic SAML Configuration section for an editing view to open on the right-hand side.

    Azure Portal: Editing certificate
  8. In the SAML Certificates section, configure the SAML Signing Certificate. (If you are doing it for the first time, the fields should be editable for you.)

    • As the Signing Option, select Sign SAML response.

    • As the Signing Algorithm, select SHA-256.

    Azure Portal: SAML signing certificate

Configure authentication in Omada Identity

Authentication on the Cloud Management Portal

Cloud
  1. Go to the Cloud Management Portal and next to your environment, select Configure.

  2. In the environment configuration, select the Authentication tab.

    Cloud Management Portal: Authentication tab
  3. In the Primary administrator section, fill in the user name and the email address.

  4. In the Identity provider section:

    1. Select Authentication type: SAML.

    2. Select the Provider: Entra ID.

    3. Fill in the Tenant ID and Application ID with the data recorded earlier.

      info

      This should cause the fields with calculated in brackets to be populated automatically by the portal.

  5. In the Identity provider configuration section, make sure that the following three values got calculated correctly, in line with the ones you recorded earlier.

    1. In the Idp endpoint (calculated) field, the value (URL) should be the same as the App Federation Metadata Url.

    2. The IdpIssuer value should be the same as the Application ID.

    3. The IdpAudience value should have the format of spn:<Application ID value>, for example: spn:a1b2c3d4-e5f6-7890-ab12-cdef34567890. This means the service principal identifier based on your Application ID.

    disclaimer & troubleshooting: generic provider

    As the calculating mechanism depends on a third party, it is subject to changes independently of Omada. Therefore, if the fields have not been calculated correctly, you can choose the Generic provider and paste the values manually.

    Cloud Management Portal: Authentication tab. Generic provider
  6. Click Apply.

Authentication in the on-prem solution

On-prem

In the on-prem solution, all values need to be copied and pasted manually into the OIS.dbo.tblCustomerAuth table, following the example:

On-prem solution: OIS.dbo.tblCustomerAuth table