LATEST VERSION: 1.5 - CHANGELOG
Single Sign-On v1.4

Azure Active Directory SAML Integration Guide Overview

This documentation introduces how to set up Azure Active Directory (Azure AD) with Security Assertion Markup Language (SAML) as the identity provider for the Single Sign-On service running on Pivotal Cloud Foundry (PCF).

Azure Active Directory (Azure AD) is Microsoft’s multi-tenant cloud based directory and identity management service.

For how to set up Azure AD with Open ID Connect (OIDC) , see Azure Active Directory OIDC Integration Guide.

Prerequisites

To integrate Azure AD with Pivotal Cloud Foundry® (PCF), you need:

Pivotal

  • PCF, version 1.7.0 or later.

  • Single Sign-On, version 1.1.0 or later.

Azure Active Directory

  • Azure Active Directory subscription.

  • A user with admin privileges.

Note: To configure SAML, you must have the Single Sign-On service broker installed on your PCF deployment. You need to create a plan, grant any plan administrators, and specify any organizations this plan should be the authentication authority for. For help configuring plans, see the Manage Service Plans topic.

Azure AD Integration Guide

Configuring Azure AD with SSO

Complete both steps below to integrate your deployment with Azure AD and SSO.

  1. Configure Azure AD as a SAML Identity Provider

  2. Configure a Single Sign-On Service Provider

Testing and Troubleshooting

Create a pull request or raise an issue on the source for this page in GitHub