1. Help Center
  2. Captive Portals

Azure AD SAML

Configuration of SAML authentication using Azure Active Directory

This page provides instructions on how to configure your Azure Active Directory to allow Captive Portal authentication with SAML.

  1. Navigate to https://portal.azure.com
  2. Go to the Azure Active Directory submenu

firstScreenshot

3. Select the active directory you wish to use for SSO

4. Click on Enterprise applications > New application > Create your own application(non-gallery)

Screenshot 2023-03-21 7.41.42 AM

 
5. Enter the name for new application and click Create

 Screenshot 2023-03-21 7.47.50 AM

 

6. In the application settings page, click on Properties

firstScreenshot

7. Change "Assignment required" value to No

firstScreenshot

8. In the application settings page, click on Single sign-on > SAML

firstScreenshot

Screenshot 2023-03-21 7.49.58 AM

9. Enter Identifier (Entity-ID) and Reply URL.

Valid values are displayed in IronWiFi Console > Captive Portal settings>Authentication Providers.

Sample values: Entity ID - https://europe-west2.ironwifi.com/api/signin/saml2

Reply URL - https://europe-west2.ironwifi.com/api/signin/saml2?acs

Screenshot 2023-03-21 1.52.06 PM

Screenshot 2023-03-21 7.56.41 AM

 

10. Under User Attributes, change User Identifier to user.mail

Screenshot 2023-03-21 7.58.48 AM

Screenshot 2023-03-21 7.59.16 AM

11. Scroll down on the single sign on page, click on "Set up your_application_name"

12. Copy SAML Single Sign-On Login URL value

13. Copy SAML Azure AD Identifier(Entity ID) value

35.189.111.2 (20)


14. copy SAML Signing Certificate - Base64 encoded content

35.189.111.2 (21)

firstScreenshot

 

Sign in to IronWiFi Console

 

1. Click on Networks > Captive Portals

Screenshot 2023-03-21 8.19.14 AM

2. Create New Captive Portal

Screenshot 2023-03-21 8.19.46 AM

3. Expand the Authentication Providers menu and click Add New

Screenshot 2023-03-21 8.19.57 AM

4. select SAML2 Single Sign-on method

Screenshot 2023-03-21 1.52.06 PM

5. Paste copied SAML Single Sign-On Login URL value to SSO URL

6. Paste copied SAML Entity ID(Azure AD Identifier) value to IDP Entity ID

7. Paste copied SAML Signing Certificate - Base64 encoded content to Certificate

8. Select NameIDFormat value urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress

firstScreenshot

9.  Click Save

10. You can test your SAML authentication using Azure Active Directory