
Switch back to the DMARCLY dashboard, paste it in the IdP Metadata Url field: Now scroll down to the SAML Certificates card on Azure portal, copy the App Federation Metadata Url value: Note: if you are in the EU zone, please make sure that both Service Provider Entity ID and Assertion Consumer Service URL start with, instead of. Then copy these 2 values from there and paste them in the Azure portal input boxes one by one. Log in to DMARCLY, go to System->Single Sign-On (SSO), toggle on the Enable Single Sign-On switch, and choose Azure AD as the Identity Provider: You need to grab Service Provider Entity ID and Assertion Consumer Service URL from the DMARCLY dashboard. Click on Edit on that card to reveal the Basic SAML Configuration modal:

Now you need to fill in Entity ID and Assertion Consumer Service URL on the Basic SAML ConfigurationĬard.

Then it will display the SSO with SAML settings page. On the Overview page, click on Get started on the Set up single sign on card, as highlighted in red below: Configure the enterprise application for SSO If it's not the case, you need to navigate to the application list, and manually click on that application. Once the enterprise application is created, it will redirect to the Overview page of the application. It may take Azure a while to create that application. Log in to the portal, go to Azure Active Directory->Enterprise Applications->New application->Create your own application, enter DMARCLY as the name of the app, also make sure the "Integrate any other application you don't find in the gallery (Non-gallery)" option is selected, then hit Create, as illustrated below:

Create an enterprise application in Azure Active Directoryįirst, we need to create an enterprise application on Azure portal. If you use Google for SSO, refer to: How to Configure Single Sign-On (SSO) with Google. If you use Okta for SSO, refer to: How to Configure Single Sign-On (SSO) with Okta. We will go over how to configure SAML-based Single Sign-On (SSO) with Microsoft Azure Active Directory in this post.
