Once enabled, go to Administration > SAML Authentication.
- In the Azure Admin Portal, go to Enterprise applications.
- Click New application.
Click the image to enlarge.
- Click Create your own application.
Click the image to enlarge.
- Enter the name of the app.
- Select Integrate any other application you don't find in the gallery (Non-gallery).
- Click Create.
Provide specific users and groups access to the application
- On the created Enterprise Application, click Assign users and groups
- Click Add user/group.
- Select the desired users or groups.
- Click Assign.
Enable users to sign into their application using their Azure AD credentials
- Under Set up single sign on, click Get started.
- Configure the following:
Azure (Enterprise Application):
- Basic SAML Configuration > Click Edit
- Identifier (Entity ID) - Copy the Service Provider entity ID from LMP.
- Reply URL (Assertion Consumer Service URL) - Copy the Single Sign On URL (ACS) from LMP.
- Attributes & Claims > Click Edit
- FED_ID - Add new claim > Name: FED_ID > Source attribute: <LMP Account Name>
- SAML Certificates > Click Edit
- Signing Option > Select Sign SAML response and assertion.
- Signing Algorithm > SHA-256.
- Download the Certificate (Base64). :
Rename the .cer to .cert.:
Upload it to Certificate under Identity Provider (IdP) Settings of LMP
- Set up the created application
- Login URL - Copy to IdP Single Sign URL of LMP.
- Azure ID identifier - IdP entity ID / issuer of LMP.
- Basic SAML Configuration > Click Edit
- Test single-sign on with the created application.