Guide for Drupal Single Sign On (SSO) using Azure AD as Identity Provider (IdP)

Azure AD Single Sign On (SSO) for Drupal  miniOrange provides a ready to use solution for Drupal. This solution ensures that you are ready to roll out secure access to your Drupal site using Azure AD within minutes.

Step 1: Configuring Azure AD as Identity Provider (IdP)

  • Navigate to Azure AD portal http://portal.azure.com. Proceed to Azure Active Directory and click on App Registrations.
  • Click on New Application Registration and then select Application you’re developing.
  • app-registration
  • Assign a Name and Sign-on URL to application.Sign-on URL will be ACS URL provided in Service Provider Metadata tab of the Module. Select Web app/API as Application type and click on Create button.
  • create-app1
  • You’ll see the app on App Registration window. Click on Settings option which will open Settings window and go to Properties section under this window.
  • properties_window
  • Here change APP ID URI value with the SP-Enity ID / Issuer value provided in Service Provider Metadata tab of the Module and save.
  • app-properties

Step 2: Configure Application

  • Click on Azure Active Directory Tab display on the leftside of Dashboard.
  • Click on Endpoints on App Registration window and copy Federation Metadata Document endpoint (will be used in step 3).
  • endpoints1
  • You can also save the metadata document by going to this endpoint.
  • endpoints

Step 3: Configuring Drupal as Service Provider (SP)

  • In miniOrange SAML Module, go to Service Provider Setup tab. There are three ways to configure the Module:
    • app-registration By Azure AD Metadata URL :

      • Click on Upload IDP Metadata.
      • Enter Metadata URL (copied in step 2) and click on Fetch Metadata.

      app-registration By Uploading Azure AD Metadata File:

      • Click on Upload IDP Metadata.
      • Upload metadata file and click on Upload.

      app-registration Manual Configuration :

      • Copy SAML Entity ID, SAML Single-Sign-On Endpoint URL and X.509 certificate from Federation Metadata document and paste it in IdP Entity ID or Issuer, SAML Login URL, X.509 Certificate fields respectively in the Module.
      Identity Provider Name For Example:Azure AD
      IdP Entity ID or Issuer SAML Entity ID in the Federation Metadata document
      SAML Login URL SAML Single-Sign-On Endpoint URL in the Federation Metadata document
      X.509 Certificate x.509 Certificate in the Federation Metadata document

Step 4: Attribute Mapping (It is Optional to fill this.) This is Premium feature.

  • Attributes are user details that are stored in your Identity Provider.
  • Attribute Mapping helps you to get user attributes from your Identity Provider (IdP) and map them to Drupal user attributes like firstname, lastname etc.
  • While auto registering the users in your Drupal site these attributes will automatically get mapped to your Drupal user details.
  • In miniOrange SAML Module, go to Mapping tab and fill in all the fields.
  • Username: Name of the username attribute from IdP (Keep NameID by default)
    Email: Name of the email attribute from IdP (Keep NameID by default)
    Group/Role Key: Name of the Role attribute from Identity Provider (IdP)
    Unable to load Image
  • You can check the Test Configuration Results under Service Provider Setup tab to get a better idea of which values to map here.

Step 5: Role mapping. (It is Optional to fill this.) This is Premium feature.

  • Drupal uses a concept of Roles, designed to give the site owner the ability to control what users can and cannot do within the site.
  • Role mapping helps you to assign specific roles to users of a certain group in your Identity Provider (IdP).
  • While auto registering, the users are assigned roles based on the group they are mapped to.
  • Unable to load Image

Step 6: Sign In Setting. This is Premium feature.

  • Go to SIGNIN Settings tab. There are multiple features availabe in this tab like Protect your whole site, Auto redirect the user to Identity Provider and Backdoor Login. To use these features, click on the respective checkboxes.
  • Unable to upload image

Business Trial For Free

If you don't find what you are looking for, please contact us at info@xecurify.com or call us at +1 978 658 9387.

Step 1: Configuring Azure AD as Identity Provider (IdP)

  • Navigate to Azure AD portal http://portal.azure.com. Proceed to the Active Directory tab and navigate to the Enterprise Applications tab
  • enterprise_applications-1
  • Click on New Application
  • new_application-1
  • Click on Non-gallery application section and enter the name for your app and click on Add button.
  • non_gallery_application-1

Step 2: Configure Application

app-registration Single Sign On Configuration

  • Click on Single sign-on from the application's left hand navigation menu. The next screen presents the options for configuring single sign-on. Click on SAML.
  • configure_single_sign_on-4
  • Enter the SP Entity ID for Identifier and the ACS URL for Reply URL from Service Provider Metadata tab of the Module.
  • configure_urls-1
  • By default following Attributes will be sent in the SAML token. You can view or edit the claims sent in the SAML token to the application under the Attributes tab.
  • user_attributes_in_saml_token-1
  • Copy App Federation Metadata Url (will be used in step 3).
  • metadata_url

azure as idp Assign users and groups to your SAML application

  • As a security control, Azure AD will not issue a token allowing a user to sign into the application unless Azure AD has granted access to the user. Users may be granted access directly, or through a group membership.
  • Click on User and groups from the applications left hand navigation menu. The next screen persents the options for assigning the users/groups to the application.
  • configure_user_groups

Step 3: Configuring Drupal as Service Provider (SP)

  • In Drupal SAML Module, go to Service Provider Setup tab. There are three ways to configure the Module:
    • azure as idp By Azure AD Metadata URL :

      • Click on Upload IDP Metadata.
      • Enter Metadata URL (copied in step 2) and click on Fetch Metadata.

      azure as idp By Uploading Azure AD Metadata File:

      • Click on Upload IDP Metadata.
      • Upload metadata file and click on Upload.

      azure as idp Manual Configuration :

      • Click on Configure Test to see the application's SAML documentation.
      • configure_sp
      • Copy SAML Entity ID,SAML Single Sign On Service URL and SAML Signing Certificate from applications SAML documentation and paste it in IdP Entity ID or Issuer, SAML Login URL, X.509 Certificate fields respectively in the Module.
      • sp_configuration_values
      Identity Provider Name For Example:Azure AD
      IdP Entity ID or Issuer SAML Entity ID
      SAML Login URL SAML Single Sign On Service URL
      X.509 Certificate SAML Signing Certificate

Step 4: Attribute Mapping (It is Optional to fill this.) This is a Premium feature.

  • Attributes are user details that are stored in your Identity Provider.
  • Attribute Mapping helps you to get user attributes from your Identity Provider (IdP) and map them to Drupal user attributes like firstname, lastname etc.
  • While auto registering the users in your Drupal site these attributes will automatically get mapped to your Drupal user details.
  • In miniOrange SAML Module, go to Mapping tab and fill in all the fields.
  • Username: Name of the username attribute from IdP (Keep NameID by default)
    Email: Name of the email attribute from IdP (Keep NameID by default)
    Group/Role Key: Name of the Role attribute from Identity Provider (IdP)
    Unable to load Image
  • You can check the Test Configuration Results under Service Provider Setup tab to get a better idea of which values to map here.

Step 5: Role mapping. (It is Optional to fill this.) This is a Premium feature.

  • Drupal uses a concept of Roles, designed to give the site owner the ability to control what users can and cannot do within the site.
  • Role mapping helps you to assign specific roles to users of a certain group in your Identity Provider (IdP) .
  • While auto registering, the users are assigned roles based on the group they are mapped to.
  • Unable to load Image

Step 6: Sign In Setting. This is a Premium feature.

  • Go to SIGNIN Settings tab. There are multiple features availabe in this tab like Protect your whole site, Auto redirect the user to Identity Provider and Backdoor Login. To use these features, click on the respective checkboxes.
  • Unable to upload image

Business Trial For Free

If you don't find what you are looking for, please contact us at info@xecurify.com or call us at +1 978 658 9387.