SP: Azure AD SAML configuration for aqua SSO

Azure AD SAML configuration for aqua SSO

1. Create an application in Azure AD as Non-Gallery and assign it a custom name. This name will later be required as the Entity ID, which we will add in aqua. See Microsoft documentation for instructions.arrow-up-right

2. Configure the URLs:

Edit Basic SAML Configuration

β€’ Login URL: https://<aqua-server>/aquaWebNG/Account/saml2-acs

β€’ Logout URL: https://<aqua-server>/aquaWebNG/Account/saml2-logout

3. aqua allows login only via username. If the username should be defined as the beginning of the email address (everything before '@'), a new claim with `extractmailprefix` from `user.principalname` must be added and a transformation applied. See documentation for additional claims.arrow-up-right

Then you need to provide us with the full claim name. It usually starts with http://schemas.xmlsoap.org...

4. The XML metadata file and certificates (at the moment aqua only supports the metadata having one certificate inside, the one that is used for signing the saml response) must also be provided if they are not globally trusted.

Last updated

Was this helpful?