Skip to main content
Version: Cloud

Configure Microsoft Entra ID with SAML

DISCLAIMER


This page contains third-party references. We strive for our content to always be up-to-date, however, the content referring to external vendors may change independently of Omada. If you spot any inconsistency, please report it to our Helpdesk.

To configure Microsoft Entra ID with SAML:

  1. Log in to the Azure Portal and create or edit the Microsoft Entra ID configuration.

  2. Select App registrations, then click + New registration.

  3. Type a name and a URL for the Omada Identity website. Select Accounts in the organizational directory only in the Supported account types, provide Redirect URI and click Register.

  4. From the Overview page of the new app registration, copy the Application ID into the IdpIssuer field and spn:<Application ID value> in IdpAudience.

  5. Select the Endpoints menu from the list of app registrations, then copy the metadata URL.

  6. Add the URL to IdpEndPoint field.

Configuring SAML from Enterprise applications

  1. Log in to the Azure Portal and create or edit the Microsoft Entra ID configuration.

  2. Go to the SAML in the Basic SAML Configuration section and click the Edit button.

  3. Configure SAML settings.

  4. Configure the SAML Signing Certificate

  5. In the SAML Certificates section copy content of the App Federation Metadata Url

  6. In the Management portal in the Authentication tab of the environment configure Identity provider configuration using the copied url in the ldp endpoint field.