Skip to main content

Setting up SAML-based login for Azure

Updated over 8 months ago

Overview

SAML allows users to authenticate with a central Identity Provider (IdP) and access multiple applications using those same credentials. In the context of Factors, SAML login lets users bypass creating separate logins for Factors and instead leverage their existing IdP credentials for authentication.

How to set it up

Factors supports SAML-based login with most of the Identity Providers (IdP) like Okta, Azure, OneLogin, etc. Depending on the IdP that your organization uses, you can find specific instructions on how to enable SAML login using your IdP below.

Using Azure

  1. Login to your Azure account and navigate to "All Applications" and click "Create Application"

2. Add Factors AI as the name of the app and select "Integrate any other application you don't find in the gallery (Non-gallery) and click "Create" on the bottom left of the side - drawer

3. Select "Single sign-on" from the left nav bar and then click on "SAML"

4. Click on edit in the basic SAML Configuration

5. Click on "Add identifier" - You can find this inside your Factors project by going into Settings >> Login and Security and then enabling SAML.

Do the same thing for Reply URL - This can be found as ACS URL

Click on Save when done

6. Go to the second section of "Attributes & Claims"
Click on Edit then select unique user identifier (Name ID)
Under Manage claim, select "user.mail" in the Source attribute section and make sure that the Name Identifier Format is set as "Email address"

7. Download the SAML certificate file and use the URL given against App Federation Metadata URL and copy the content present between the start and end tags of «X509Certificate»

Paste this in the SAML Certificate Section

7. Copy the Login URL under the Set up Test SAML azure section and paste it in the Login URL in Factors

Did this answer your question?