Note: This guide includes screenshots and instructions for a third-party platform that could change at any time. Be sure to reference Azure Active Directory's documentation for the latest information.
Please find full documentation for Federated Authentication here.
- First, an Azure AD administrator should select New Application
- Next, select Create your own application, and choose Integrate any other application you don’t find in the gallery (non-gallery).
- NOTE: Name the application in a way that will make it easy for you to identify - the name has no bearing on the integration with the Acquia Cloud Platform.
- Choose the SAML single sign-on method
- Begin to Configure the application. NOTE: Start with section 4, Set up [Application Name]. This section contains the first pieces of metadata that you will need to enter on the Acquia Cloud Platform UI.
- Copy the Login URL (shown below) and enter it in the SSO URL field on the Acquia Cloud Platform UI.
- Copy the Azure AD Identifier (shown below) and enter it in the Entity ID field on the Acquia Cloud Platform UI.
- Next, go to section 3, SAML Signing Certificate and download the public certificate in PEM format. The option to download in PEM format is not readily available on this screen. To download it, click the edit pencil in the upper right corner of the box. Find the certificate, and then click the breadcrumbs to find PEM Certificate download. Download the certificate, and then copy and paste it into the Acquia Cloud Platform UI.
- Now, go back to section 1, Basic SAML Configuration. Here, Azure AD requires you to provide metadata from the Cloud Platform.
- In the Identifier (Entity ID) field (shown below), enter the Entity ID from the Acquia Cloud Platform UI. Be sure to set it as the default value.
- In the Reply URL (Assertion Consumer Service URL) field (shown below), enter the ACS Link from the Acquia Cloud Platform UI.
- Double check this information, and submit. Review your final configuration and Enable the connection when you are ready.