Add Microsoft Azure Active Directory as an identity provider#

Use Microsoft Azure Active Directory (AD) to give your organization users single sign-on (SSO) access to Aiven.

Prerequisite steps in Aiven Console#

Add Azure as an identity provider in the Console.

Configure SAML on Microsoft Azure#

First, you set up the application on Azure. Then, you add a claim and users.

Set up an Azure application#

  1. Log in to Microsoft Azure.

  2. Got to Enterprise applications.

  3. Select All applications.

  4. Click New application.

  5. Select the Add from the gallery search bar and use the Azure AD SAML Toolkit.

  6. Click Add.

  7. Go back to the Enterprise applications list.

    Note

    The newly created application might not be visible yet. You can use the All applications filter to see the new application.

  8. Click on the name of the new application. The configuration opens.

  9. Select Single sign-on configuration.

  10. Select SAML as the single sign-on method.

  11. Add the following parameters to the Basic SAML Configuration:

Parameter

Value

Identifier (Entity ID)

https://api.aiven.io/v1/sso/saml/account/{account_id}/method/{account_authentication_method_id}/metadata

Reply URL (Assertion Consumer Service URL)

https://api.aiven.io/v1/sso/saml/account/{account_id}/method/{account_authentication_method_id}/acs

Sign on URL

https://console.aiven.io

  1. Click Save.

Create a claim and add users#

  1. In the User Attributes & Claims, click Add a new claim.

  2. Create an attribute with the following data:

Parameter

Value

Name

email

Source

Attribute

Source Attribute

user.mail

  1. Download the Certificate (Base64) from the SAML Signing Certificate section.

  2. Go to Users and groups and click Add user.

  3. Select the users that you want to use Azure AD to log in to Aiven.

  4. Click Assign.

Finish the configuration in Aiven#

Go back to the Aiven Console to configure the IdP and complete the setup.

Troubleshooting#

If you get an error message suggesting you contact your administrator, try these steps:

  1. Go to the Microsoft Azure AD user profile for the users.

  2. In Contact Info, check whether the Email field is blank.

If it is blank, there are two possible solutions:

  • In User Principal Name, if the Identity field is an email address, try changing the User Attributes & Claims to email = user.userprincipalname.

  • In Contact Info, if none of the Alternate email fields are blank, try changing the User Attributes & Claims to email = user.othermail.

If you still have login issues, you can use the SAML Tracer browser extension to check the process step by step. If this doesn’t work, get in touch with our support team at support@Aiven.io.