Microsoft Entra ID (SAML)
Last updated
Last updated
The Setupo process requires to operate simultaneously on Cusna and on the Azure Portal. We suggest to keep them open in two different tabs of your browser.
Form your Cusna dashboard, go to Setup, Integration on the sidebar, then click New Integration button on the card.
Form the System dropdown, select SAML.
On the Type dropdown, select Microsoft Entra.
At this point you'll see two variables getting populated: Reply URL and Entity ID. Copy these two variables as you'll need them in the next step in the Azure Portal.
Keep your Cusna portal open. DO NOT CLOSE the Cusna page.
Log in to Microsoft Azure in a new browser tab, click Enterprise applications > New application.
Click Create your own application, enter a name for the application, select Integrate any other application you don't find in the gallery (Non-gallery) and click Create.
Click Assign users and group to define which Users or User groups can login with this application. You can assign individual users or groups of users.
Once done with the assignment, go back to the main page of the app.
Click Single sign on on the sidebar, select SAML. The page Set up Single Sign-On with SAML appears. Click Edit in the "Basic SAML Configuration" card. Enter the Identifier (Entity ID) and the Reply URL value provided in the Cloud4Wi Dashboard (see top of the page). Click Save. The value will be reflected in the related card.
Click Edit on the "Attributes & Claims" card. Default values are usually the correct ones, but make sure that :
claim name Unique User Identifier matches source attribute user.userpincipalname
claim name groups matches source attribute user.groups [All] if you don't have this entry, click on the button "+ Add a group claim" and select All groups in the Group Claims dialog.
claim name emailaddress matches source attribute user.mail
claim name givenname matches source attribute user.givenname
claim name name matches source attribute user.name
claim name surname matches source attribute user.surname
Go back to the main screen Set up Single Sign-On with SAML. Find in the page the section SAML Certificates. Find the attribute App Federation Metadata Url and copy its value in the Cusna setup panel in the filed Metadata URI
In Cusna, click Save.
Ensure all users can sign on without the need to set up separate permissions in Entra ID. Form the main page of the application, go to the Properties page and select No for Assignment required and Yes to Visible to users.