deployment

No menu items for this category

SAML AZURE SSO

Follow the sections in this guide to set up Azure SSO using SAML.

  • Login to Azure Portal as an administrator and search for Microsoft Entra ID.
EnterpriseApplications
  • Click on Enterprise Applications and then + New Application .
new-application
  • After that a new window will appear with different applications, click on Create your own application.
create-own-application
  • Give your application a name and select Integrate any other application you don't find in the gallery and then click Create.
name-application-create
  • Once you have the application created, open the app from list , and then click on Single Sign-On and then SAML.
saml-create-single-sign-On
  • Edit Basic SAML Configuration and populate the values as shown below for EntityId and Assertion Consumer Service Url. These value should match the one configured with Openmetadata Server side for samlConfiguration.sp.entityId and samlConfiguration.sp.acs respectively. After this click Save.
edit-basic-saml-configuration
  • Click on Attributes and Claims and click on the Required Claim (NameId).
edit-claims
  • You will see the values as below image, we need to set the value Source Attribute to a user mail value claim from the IDP. Click on Edit and then select the Source Attribute as user.mail or user.userprincipalname (in some cases this is also a mail) and then click Save.
edit-claim-value
  • To Confirm the claim value we can navigate to user page and check the value of the user. In my case as you can see User Princpal Name is a my mail which i want to use for Openmetadata , so for me user.userprincipalname would be correct claim.
user-claim-value
  • Open the downloaded metadata xml file, and populate the following properties in openmetadata.yml
populate-metadata
  • IDP Config
    entityID -> Populate it from Metadata XML Entity ID HTTP-Redirect SSO Login URL -> always select HTTP-Redirect Url for SSO Login Url X509 Certificate -> This is also available in the IDP XML. NameIDFormat -> from MetadataXML NameIDFormat authorityUrl -> set as {http}/{https}://{domain}:{port}/api/v1/saml/login

  • SP Config entityId -> -> set as {http}/{https}://{domain}:{port}/api/v1/saml/acs acs -> Assertion Consumer Url , set as {http}/{https}://{domain}:{port}/api/v1/saml/acs spX509Certificate -> set to your X509 Signing Key callback -> set as {http}/{https}://{domain}/api/v1/saml/callback

  • Start the OpenMetadata server. With AUTHENTICATION_PROVIDER set to saml, you should be routed to the IDP upon sign-in.