Guide for Drupal Single Sign On (SSO) using Azure AD as Identity Provider (IdP)

Azure AD Single Sign On (SSO) for Drupal  miniOrange provides a ready to use solution for Drupal. This solution ensures that you are ready to roll out secure access to your Drupal site using Azure AD within minutes.

Step 1: Configuring Azure AD as Identity Provider (IdP)

  • Navigate to Azure AD portal https://portal.azure.com.
  • Click on Azure Active Directory from Azure services.
  • Drupal SAML Single Sign On (SSO), Azure AD SSO Login
  • In the left-hand navigation pane, click the App registrations service, and click New registration.
  • Drupal SAML Single Sign On (SSO), Azure AD SSO App-Registration
  • Assign a Name and Redirect URI to application. Redirect URI will be ACS URL provided in Service Provider Metadata tab of the Module. Select Web app as Application type and click on Register button.
  • Drupal SAML Single Sign On (SSO) register an application
  • You’ll see the app on App Registration window. Click on Authentication option which will open Authentication window and then click on Add a Platform button under this window. Now, add Redirect URI and Logout URL and click on Configure button.
  • Drupal SAML Single Sing On (SSO) configure app
  • Click on Expose an API display on the leftside of Dashboard. Here change Application ID URI value with the SP-Enity ID / Issuer value provided in Service Provider Metadata tab of the Module and save.
  • Drupal SAML Single Sing On (SSO) API properties window

Step 2: Configure Application

  • Click on App registrations display on the leftside of Dashboard.
  • Click on Endpoints on App Registration window and copy Federation Metadata Document endpoint (will be used in step 3). You can also save the metadata document by going to this endpoint.
  • Drupal SAML Single Sing On (SSO) Application endpoints

Step 3: Configuring Drupal as Service Provider (SP)

  • In miniOrange SAML Module, go to Service Provider Setup tab. There are three ways to configure the Module:
    • app-registration By Azure AD Metadata URL :

      • Click on Upload IDP Metadata.
      • Enter Metadata URL (copied in step 2) and click on Fetch Metadata.

      app-registration By Uploading Azure AD Metadata File:

      • Click on Upload IDP Metadata.
      • Upload metadata file and click on Upload.

      app-registration Manual Configuration :

      • Copy SAML Entity ID, SAML Single-Sign-On Endpoint URL and X.509 certificate from Federation Metadata document and paste it in IdP Entity ID or Issuer, SAML Login URL, X.509 Certificate fields respectively in the Module.
      Identity Provider Name For Example:Azure AD
      IdP Entity ID or Issuer SAML Entity ID in the Federation Metadata document
      SAML Login URL SAML Single-Sign-On Endpoint URL in the Federation Metadata document
      X.509 Certificate x.509 Certificate in the Federation Metadata document

Step 4: Attribute Mapping (It is Optional to fill this.) This is Premium feature.

  • Attributes are user details that are stored in your Identity Provider.
  • Attribute Mapping helps you to get user attributes from your Identity Provider (IdP) and map them to Drupal user attributes like firstname, lastname etc.
  • While auto registering the users in your Drupal site these attributes will automatically get mapped to your Drupal user details.
  • In miniOrange SAML Module, go to Mapping tab and fill in all the fields.
    Username: Name of the username attribute from IdP (Keep NameID by default)
    Email: Name of the email attribute from IdP (Keep NameID by default)
    Group/Role Key: Name of the Role attribute from Identity Provider (IdP)
  • Drupal SAML Single Sing On (SSO) attribute mapping
  • You can check the Test Configuration Results under Service Provider Setup tab to get a better idea of which values to map here.

Step 5: Role mapping. (It is Optional to fill this.) This is Premium feature.

  • Drupal uses a concept of Roles, designed to give the site owner the ability to control what users can and cannot do within the site.
  • Role mapping helps you to assign specific roles to users of a certain group in your Identity Provider (IdP).
  • While auto registering, the users are assigned roles based on the group they are mapped to.
  • Drupal SAML Single Sing On (SSO) role mapping

Step 6: Sign In Setting. This is Premium feature.

  • Go to SIGNIN Settings tab. There are multiple features availabe in this tab like Protect your whole site, Auto redirect the user to Identity Provider,auto-create user and Backdoor Login. To use these features, click on the respective checkboxes.
  • Drupal SAML Single Sing On (SSO) sign in settings

Business Trial For Free

If you don't find what you are looking for, please contact us at info@xecurify.com or call us at +1 978 658 9387.

Step 1: Configuring Azure AD as Identity Provider (IdP)

  • Navigate to Azure AD portal https://portal.azure.com. Proceed to the Active Directory tab and navigate to the Enterprise Applications tab
  • Drupal SAML Single Sing On (SSO) enterprise applications
  • Click on New Application
  • Drupal SAML Single Sing On (SSO) new application
  • Click on Non-gallery application section and enter the name for your app and click on Add button.
  • Drupal SAML Single Sing On (SSO) non gallery application

Step 2: Configure Application

Drupal SAML Single Sing On (SSO) app registration Single Sign On Configuration

  • Click on Single sign-on from the application's left hand navigation menu. The next screen presents the options for configuring single sign-on. Click on SAML.
  • configure_single_sign_on-4
  • Enter the SP Entity ID for Identifier and the ACS URL for Reply URL from Service Provider Metadata tab of the Module.
  • Drupal SAML Single Sing On (SSO) configure urls
  • By default following Attributes will be sent in the SAML token. You can view or edit the claims sent in the SAML token to the application under the Attributes tab.
  • Drupal SAML Single Sing On (SSO) user attributes in saml token
  • Copy App Federation Metadata Url (will be used in step 3).
  • Drupal SAML Single Sing On (SSO) metadata url
azure as idp Assign users and groups to your SAML application

  • As a security control, Azure AD will not issue a token allowing a user to sign into the application unless Azure AD has granted access to the user. Users may be granted access directly, or through a group membership.
  • Click on User and groups from the applications left hand navigation menu. The next screen persents the options for assigning the users/groups to the application.
  • Drupal SAML Single Sing On (SSO) configure user groups

Step 3: Configuring Drupal as Service Provider (SP)

  • In Drupal SAML Module, go to Service Provider Setup tab. There are three ways to configure the Module:
    • bullet By Azure AD Metadata URL :

      • Click on Upload IDP Metadata.
      • Enter Metadata URL (copied in step 2) and click on Fetch Metadata.

      bullet By Uploading Azure AD Metadata File:

      • Click on Upload IDP Metadata.
      • Upload metadata file and click on Upload.

      bullet Manual Configuration :

      • Click on Configure Test to see the application's SAML documentation.
      • Drupal SAML Single Sing On (SSO) application's SAML documentation
      • Copy SAML Entity ID,SAML Single Sign On Service URL and SAML Signing Certificate from applications SAML documentation and paste it in IdP Entity ID or Issuer, SAML Login URL, X.509 Certificate fields respectively in the Module.
      • Drupal SAML Single Sing On (SSO) configure module using application's metadata
      Identity Provider Name For Example:Azure AD
      IdP Entity ID or Issuer SAML Entity ID
      SAML Login URL SAML Single Sign On Service URL
      X.509 Certificate SAML Signing Certificate

Step 4: Attribute Mapping (It is Optional to fill this.) This is a Premium feature.

  • Attributes are user details that are stored in your Identity Provider.
  • Attribute Mapping helps you to get user attributes from your Identity Provider (IdP) and map them to Drupal user attributes like firstname, lastname etc.
  • While auto registering the users in your Drupal site these attributes will automatically get mapped to your Drupal user details.
  • In miniOrange SAML Module, go to Mapping tab and fill in all the fields.
  • Username: Name of the username attribute from IdP (Keep NameID by default)
    Email: Name of the email attribute from IdP (Keep NameID by default)
    Group/Role Key: Name of the Role attribute from Identity Provider (IdP)
    Drupal SAML Single Sing On (SSO) attribute mapping
  • You can check the Test Configuration Results under Service Provider Setup tab to get a better idea of which values to map here.

Step 5: Role mapping. (It is Optional to fill this.) This is a Premium feature.

  • Drupal uses a concept of Roles, designed to give the site owner the ability to control what users can and cannot do within the site.
  • Role mapping helps you to assign specific roles to users of a certain group in your Identity Provider (IdP) .
  • While auto registering, the users are assigned roles based on the group they are mapped to.
  • Drupal SAML Single Sing On (SSO) role mapping

Step 6: Sign In Setting. This is a Premium feature.

  • Go to SIGNIN Settings tab. There are multiple features availabe in this tab like Protect your whole site, Auto redirect the user to Identity Provider and Backdoor Login. To use these features, click on the respective checkboxes.
  • Drupal SAML Single Sing On (SSO) sign-in settings

Business Trial For Free

If you don't find what you are looking for, please contact us at info@xecurify.com or call us at +1 978 658 9387.