Azure AD (Azure Active Directory) Single Sign-On (SSO) login for Magento [SAML] can be achieved by using our Magento SAML SP Single Sign-On (SSO) plugin.
Our SSO solution will make Magento SAML 2.0 compliant Service Provider establishing trust between the Magento site and Azure AD (Microsoft Entra ID) to securely authenticate and login users to the Magento site. Our Magento Single Sign-On (SSO) solution helps to
secure Magento sites behind the SSO login so that users are authenticated using their Azure AD (Microsoft Entra ID) / Azure B2C / Office 365 / Microsoft 365 login credentials. Seamless support for advanced SSO features like Attribute / Custom Mapping, Role Mapping etc.
Here we will go through a guide to configure SAML Single Sign-On SSO login between Magento site and Azure AD (Microsoft Entra ID) by considering Azure AD as IdP (Identity Provider) and Magento as SP (Service Provider). Our SSO plugin
provides Unlimited user authentications from Azure AD / Azure B2C. To know more about other features we provide in you Magento SAML Single Sign-On (SSO) plugin, you can click here.
You can refer the steps to configure Azure AD (Microsoft Entra ID) for Magento SAML SSO from the video or documentation given below:
Steps to configure Azure AD (Microsoft Entra ID) SAML Single Sign-On (SSO) Login into Magento
1. Setup Azure AD (Microsoft Entra ID) as IdP (Identity Provider)
Follow the steps below to configure Azure AD as IdP for Magento
Configure Azure AD (Microsoft Entra ID) as IdP
In the Magento SAML SP SSO plugin, navigate to Service Provider Metadata tab. In this tab you will find the SP metadata such as SP Entity ID and ACS (AssertionConsumerService) URL which are required to configure Azure AD as the Identity Provider.
Enter your app's name, then go to the Non-gallery application section and click the Create button.
Click on Setup Single sign-on tab.
Select the SAML tab.
After clicking Edit, from the Service Provider Metadata tab of the plugin, enter the SP Entity ID for Identifier and the ACS URL for Reply URL.
The following Attributes will be sent by default in the SAML response. Under the Attributes tab, you may view or update the claims sent in the SAML response to the application.
To get the Endpoints you'll need to configure your Service Provider, copy the App Federation Metadata Url.
Assign users and groups to your SAML application
To add a user or group, go to the Users and Groups tab and select Add user/group.
To assign the required user, go to Users and then go to Select.
In the Select Role section, you may also designate a role to your application.
You've successfully set up Azure AD (Microsoft Entra ID) as a SAML IdP (Identity Provider) to enable Azure AD SSO on your Magento site.
Select App registrations tab from left hand side menu.
Click on New registration button.
Choose an account type and give it a name.
Provide the ACS URL provided in the Service Provider Metadata tab of the plugin in the Redirect URL field and click the Register button.
From the left menu panel, select Expose an API.
Replace the APPLICATION ID URL with the SP Entity ID of the plugin by clicking the Set button.
NOTE: Please double-check that the SP Entity ID value in the Service Provider Metadata tab does not have a trailing slash('/'). Remove the trailing slash from the SP EntityID / Issuer field under the Service Provider Metadata tab of the plugin, enter the revised value at Azure, and click the Save button if the SP Entity ID has a trailing slash.
Navigate back to Azure Active Directory then click on App Registrations button and click on Endpoints.
This will lead you to a window containing a list of URLs.
To obtain the Endpoints needed to configure your Service Provider, copy the Federation Metadata document URL.
You have successfully configured Azure AD as SAML IdP ( Identity Provider) for achieving Azure AD (Microsoft Entra ID) SSO login into your Magento Site.
2. Configure Magento as SP (Service Provider)
Copy SAML Entity ID, SAML Single-Sign-On Endpoint URL and x.509 certificate from Federation Metadata document and paste it in IdP Entity ID or Issuer, Single Sign-on Service URL, x.509 Certificate fields respectively in the plugin.
IdP Entity ID or Issuer
SAML Entity ID in the Federation Metadata document
Single Sign-On Service URL
SAML Single-Sign-On Endpoint URL in the Federation Metadata document
X.509 Certificate
x.509 Certificate in the Federation Metadata document
Click on Save button to save all your settings.
To check if your Magento as SP is configured correctly, click the Test Configuration button.
3. Sign-In Settings
Navigate to Sign-in Settings tab. Here you find the option the enable the login link on Admin*/Customer Login Page (*Admin SSO is available in the premium versions)
If you want to initate SSO from any page you can also use the SSO link provided in the extension.
The Premium extension also provides you the the feature to auto redirect your user to the IdP Login Page if the user is not already logged in.
4. Customer / Admin SSO
Customer Single Sign-On (Customer SSO)
Admin Single Sign-On (Admin SSO)
Go to customer login page and you will see the SSO button on your frontend. Click on the button and test the SSO.
You will be sucessfully logged in into Magento.
Visit your admin login page and you will see the SSO button on your admin page. Click on the button to initate SSO as an admin.
After sucessfully logged into magento as admin you will be redirect to magento backend dashboard.
Attribute Mapping / Custom Attribute Mapping(Optional). *This is Premium feature.
1.1: Attribute Mapping (Optional).
Attributes are user details that are stored in your Identity Provider.
Attribute Mapping helps you to get user attributes from your Identity Provider (IdP) and map them to Magento user attributes like firstname, lastname etc.
While auto registering the users in your Magento site these attributes will automatically get mapped to your Magento user details.
Only NameID can be mapped to Magento's Email and Username characteristics with the free plugin. Multiple user attributes from the IdP, on the other hand, can be mapped to Magento attributes in the premium version of the plugin. You can map custom attributes that you've added to your IdP in addition to the default attributes.
When a user performs SSO, the NameID value sent by the IdP will get mapped to the email and the username of the Magento user.
Username:
Name of the username attribute from IdP (Keep NameID by default)
Email:
Name of the email attribute from IdP (Keep NameID by default)
Group/Role:
Name of the Role attribute from Identity Provider (IdP)
You can check the Test Configuration Results under Service Provider Setup tab to get a better idea of which values to map here.
1.2: Custom Attribute Mapping (Optional). *This is Premium feature.
Enter your table name in Table field.
Enter attribute name as your column name (in the respective table)
Click on Add button for adding custom magento attribute and map the respective field with the attribute receiving from your identity provider
Click on save button for saving the configuration.
You can also delete the configuration by entering the name in attribute name field and then click on delete button.
Role Mapping (Optional). *This is Premium feature.
You can specify a default role in the free plugin that will be allocated to all non-admin users when they conduct SSO.
Go to Attribute/Role mapping tab and navigate to Role Mapping section.
Select the Default Role and click on the Save button.
In this Guide, you have successfully configured Azure AD SAML Single Sign-On (Azure AD SSO Login) choosing Azure AD as IdP and Magento as SP using Magento SAML Sigle Sign-On (SSO) Login plugin .This solution ensures that you
are ready to roll out secure access to your Magento site using Azure AD login credentials within minutes.