Skip to main content

Microsoft Entra (Azure AD) SAML Setup

in Authentication and SSO
Authors list
Published: 22 Sept 2021|Last updated: 16 Feb 2024

You are able to use Microsoft Entra (formerly Azure Active Directory) as an Identity Provider (IdP) to log Users and Agents into Deskpro using the SAML protocol.

Creating the SAML applicationCopy link to Creating the SAML application to clipboard

Note

Throughout this guide, you will need to interact back and forth with both Deskpro and Microsoft Entra. We recommend having both configuration pages open in separate tabs as you will need to switch between them often.

Creating this application within Microsoft Entra requires Global Administrator rights on your Microsoft365 account.

In Microsoft EntraCopy link to In Microsoft Entra to clipboard

Either go to your Microsoft365 Admin Center, then select Identity from your Admin centers, or visit the Microsoft Entra admin center directly. Screenshot_20240212_164607.png

From here, select Applications, then Enterprise applications. Screenshot_20240212_164733.png

In the Enterprise Applications page, select + New application, then + Create your own application.

Enter an identifiable name for your application, then select Non-Gallery from the radio buttons and click Create Screenshot_20240212_164908.png

In the new application, select Single sign-on, and select SAML as your single sign-on method.

In DeskproCopy link to In Deskpro to clipboard

Go to Admin > Agents > Auth & SSO for Agents, or Admin > CRM > User Auth & SSO for Users.

Scroll down to Add Authentication and select SAML Authentication from the available apps. Screenshot_20240212_170429.png

From the Microsoft Entra SAML configuration, copy the following values and paste into their respective fields within Deskpro. Screenshot_20240212_165157.png Screenshot_20240216_124144.png

Entra

Deskpro

Login URL

Single Sign On URL

Logout URL

Single Log Off URL

App Federation Metadata Url

Issuer XML metadata URL

Scroll to the bottom of the Deskpro SAML configuration and click Add.

Once the app has been created, reopen it by clicking Manage, then scroll down to Configuration Settings. You will need the SAML Details for the next step. Screenshot_20240212_174910.png

In Microsoft EntraCopy link to In Microsoft Entra to clipboard

In Section 3 of the Microsoft Entra SAML configuration, make a note of the Expiration date of the SAML certificates. This will update after the next step.

Scroll up to Section 1 and click Edit in the top right. From the Deskpro SAML configuration, copy the following values and paste into their respective fields within Microsoft Entra. Screenshot_20240212_175005.png image.png

Deskpro

Entra

Consumer Service URL (ACS)

Reply URL (Assertion Consumer Service URL)

Single Logout Service URL (SLS)

Logout Url

Metadata URL (Entity ID)

Identifier (Entity ID)

Click Save at the top and close the window.

In Section 3 again, check the Expiration date and confirm it has changed. It should be the current date + 3 years. If it still shows the previous date, close and reopen the app.

Download the Certificate (Base64) and in the Deskpro SAML configuration, upload this certificate to the X.509 Certificate field. Screenshot_20240216_124230.png

In DeskproCopy link to In Deskpro to clipboard

Add a label to the Login Button Text field, then click Save to save the changes.

Your SAML application should now be configured, and can be enabled by clicking the toggle.

Managing accessCopy link to Managing access to clipboard

By default, you will need to allow users to login via the SAML application. This is handled within the Microsoft Entra application directly.

Select Users and groups, then click + Add user/group. From here, you can add specific users or groups who should have access to your helpdesk through this application.

HelpfulUnhelpful

2 of 4 people found this page helpful

Pages in Microsoft Entra (Azure AD) SAML Setup

Configure AD Sync through SCIM
Authors list
Published: 3 Nov 2022
Last updated: 16 Feb 2024
next pageAzure AD Open ID Connect
previous pageActive Directory setup

Please log in or register to submit a comment.