Azure AD as IdP for WordPress

WordPress SAML SP Single Sign-On plugin gives the ability to enable SAML Single Sign-On for your WordPress sites. Our plugin is compatible with all the SAML compliant Identity providers. Here we will go through a step-by-step guide to configure SSO between WordPress site and Azure AD / Office 365 by considering Azure AD / Office 365 as IdP.

miniorange img Pre-requisites : Download And Installation

To configure Azure AD as SAML IdP with WordPress, you will need to install the miniOrange WP SAML SP SSO plugin:

Step 1: Setup Azure AD as Identity Provider

Follow the steps below to configure Azure AD as IdP

    miniorange img Configure Azure AD as IdP

    • In the miniOrange SAML SP SSO plugin, navigate to Service Provider Metadata tab. Here, you can find the SP metadata such as SP Entity ID and ACS (AssertionConsumerService) URL which are required to configure the Identity Provider.
    • wordpress saml upload metadata

    miniorange img Instructions:

  • Log in to Azure AD Portal

  • Select Azure Active DirectoryApp Registrations. Click on New Application Registration.

  • azure ad sso-1
  • Assign a Name and choose the account type.In the Redirect URI field, provide the ACS URL provided in Service Provider Info tab of the plugin and click on Register button.
  • azure ad sso-2
  • Now, navigate to Expose an API menu option and Click the Set button and replace the APPLICATION ID URI with the plugin's SP Entity ID

    Here, enter the SP Entity ID value from the Service Provider Metadata tab of the plugin.

    NOTE: Please ensure that the SP Entity ID value from the Service Provider Metadata tab doesn't have a trailing slash('/'). If SP Entity ID has a trailing slash then update it by removing the trailing slash from the SP EntityID / Issuer field under the Service Provider Metadata tab of the plugin, enter the updated value at Azure and click on the Save button.

  • azure ad sso-3
  • Go back to Azure Active DirectoryApp Registrations window and click on Endpoints link.

  • azure ad sso-4
  • This will open up a window with multiple URLs listed there. Copy the Federation Metadata Document URL. This will be required while configuring the SAML plugin.

  • azure ad sso-5
  • Log in to Azure AD Portal

  • Select Azure Active Directory ⇒ Enterprise Applications.

  • azure ad sso-6
  • Click on New Application.

  • azure ad sso-7
  • Click on Non-gallery application section and enter the name for your app and click on Add button.

  • azure ad sso-8
  • Click on Single sign-on from the application's left-hand navigation menu. The next screen presents the options for configuring single sign-on. Click on SAML.

  • azure ad sso-9
  • Enter the SP Entity ID for Identifier and the ACS URL for Reply URL from Service Provider Info tab of the plugin.

  • azure ad sso-10 azure ad sso-10
  • By default, the following Attributes will be sent in the SAML token. You can view or edit the claims sent in the SAML token to the application under the Attributes tab.

  • azure ad sso-11
  • Copy App Federation Metadata Url. This will be used while configuring the SAML plugin.

  • azure ad sso-12
  • Assign users and groups to your SAML application
    • As a security control, Azure AD will not issue a token allowing a user to sign in to the application unless Azure AD has granted access to the user. Users may be granted access directly, or through group membership.
    • Click on Users and groups from the applications left-hand navigation menu. The next screen presents the options for assigning the users/groups to the application.
    • azure ad sso-13
    • After clicking on Add user, Select Users and groups in the Add Assignment screen.
    • The next screen presents the option for selecting user or invite an external user. Select the appropriate user and click on the Select button.
    • azure ad sso-13
    • Here, you can also assign a role to this user under Select Role section. Finally, click on Assign button to assign that user or group to the SAML application.
    • azure ad sso-13