Z7_99H0H382L00010Q975FF6J3GC5
MFAS Default Content

SAML2 Azure

The SAML2 configuration requires a valid Office 365 subscription, Azure AD Premium P2 is recommended.

Add a new enterprise registration

Portal.azure.com/Azure active directory/ Enterprise applications / New application
Select “non-gallery application”
Name: MFAS Portal (or a name of choice).

Assign users and groups

Assign users or groups (maybe a test group at first)

Set up single sign on

Select “SAML”

Download the SSO Gateway metadata

Browse either to:

https://www.mfas.nl/sso/ibm/saml20/<customerid>/samlmetadata

In the above URI’s, the term “<customerid>” must match the Customers unique id and will be provided by the MFAS Portal administrator.

Upload the metadata to Microsoft Azure

Set the basic SAML Configuration

Examples:

Identifier: https://www.mfas.nl/sso/ibm/saml20/acuity
Reply URL (Assertion Consumer Service URL): https://www.mfas.nl/sso/ibm/saml20/acuity/acs
Sign on URL: https://www.mfas.nl/sso/mfas_sso/init/acuity
In the example above, “acuity” is the customerid.

Leave the user attributes & claims as default

Givenname: user.givenname
Surname: user.surname
Emailaddress: user.mail
Name: user.userprincipalname
Unique User Identifier: user.userprincipalname

Provide the metadata

Send the downloaded XML file to the MFAS Portal administrator.
You can also provide the “app federation metadata URL”

Test the SSO.with a valid user

Note: Before the test can be performed, the MFAS Portal administrator needs to confirm the Federation Metadata XML file has been processed on the server. If the metadata has not been processed, all tests will fail!

Press the test button:

Complementary Content
${loading}