Add Microsoft Azure Active Directory as an identity provider
Use Microsoft Azure Active Directory (AD) to give your organization users single sign-on (SSO) access to Aiven.
Step 1: Add the IdP in the Aiven Console
- In the organization, click Admin.
- Click Identity providers.
- Click Add identity provider.
- Select an identity provider and enter a name.
- Select a verified domain to link this IdP to. Users see linked IdPs on the login page.
On the Configuration step are two parameters that you use to set up the SAML authentication in your IdP:
- Metadata URL
- ACS URL
Step 2: Configure SAML on Microsoft Azure
Set up an Azure application
-
Log in to Microsoft Azure.
-
Go to Enterprise applications.
-
Click All applications.
-
Click New application.
-
Click the Add from the gallery search bar and use the Azure AD SAML Toolkit.
-
Click Add.
-
Go back to the Enterprise applications list.
noteThe newly created application might not be visible. You can use the All applications filter to see the new application.
-
Click the name of the new application.
-
Click Single sign-on.
-
Select SAML as the single sign-on method.
-
Add the following parameters to the Basic SAML Configuration:
Parameter Value Identifier (Entity ID) https://api.aiven.io/v1/sso/saml/account/{account_id}/method/{account_authentication_method_id}/metadata
Reply URL (Assertion Consumer Service URL) https://api.aiven.io/v1/sso/saml/account/{account_id}/method/{account_authentication_method_id}/acs
Sign on URL https://console.aiven.io
-
Click Save.
Create a claim and add users
-
In the User Attributes & Claims, click Add a new claim.
-
Create an attribute with the following:
Parameter Value Name email Source Attribute Source Attribute user.mail -
Download the Certificate (Base64) from the SAML Signing Certificate section.
-
Go to Users and groups and click Add user.
-
Select the users that will use Azure AD to log in to Aiven.
-
Click Assign.
Step 3: Finish the configuration in Aiven
Go back to the Aiven Console to complete setting up the IdP. If you saved your IdP as a draft, you can open the settings by clicking the name of the IdP.
- In the IDP URL field, enter the Login URL from Azure.
- In the Entity ID field, enter the Azure AD Identifier from Azure.
-
Paste the certificate from the IdP into the Certificate field.
-
Optional: Paste or upload a JSON file with configuration details for your IdP.
-
Click Next.
-
Configure the security options for this IdP and click Next.
-
Require authentication context: This lets the IdP enforce stricter security measures to help prevent unauthorized access, such as requiring multi-factor authentication.
-
Require assertion to be signed: The IdP checks for a digital signature. This security measure ensures the integrity and authenticity of the assertions by verifying that they were issued by a trusted party and have not been tampered with.
-
Sign authorization request sent to IdP: A digital signature is added to the request to verify its authenticity and integrity.
-
Extend active sessions: This resets the session duration every time the token is used.
-
Enable group syncing: This syncs the group membership from your IdP to the Aiven Platform.
note- The Aiven Platform doesn't create groups with this feature. It only syncs the group membership between the groups in your IdP and the groups you create in Aiven. For user group provisioning, use SCIM.
- User group membership automatically syncs when a user logs in.
- The IdP is the single source of truth. If a group in the IdP doesn't exist in Aiven, it will be ignored. Likewise, if a user is added to a group in Aiven Console but not in the IdP, they will be removed from the Aiven group when the group membership syncs.
-
-
Optional: Select a user group to add all users who sign up with this IdP to.
-
Click Finish to complete the setup.
If you set up a SAML authentication method before and are now switching to a new IdP, existing users need to log in with the new account link URL to finish the setup.
Troubleshooting
If you get an error message to contact your administrator:
- Go to the Microsoft Azure AD user profile for the users.
- In Contact Info, check whether the Email field is blank.
If it is blank, there are two possible solutions:
- In User Principal Name, if the Identity field is an email
address, try changing the User Attributes & Claims to
email = user.userprincipalname
. - In Contact Info, if none of the Alternate email fields are
blank, try changing the User Attributes & Claims to
email = user.othermail
.