Skip to main content
Azure SAML

Use this guide to set up Azure SSO SAML for your organisation on Tapt

Elon Datt avatar
Written by Elon Datt
Updated over 8 months ago

Overview

Azure SAML 2.0 is a widely-used authentication protocol that enables users to log in to multiple applications using a single set of credentials. This protocol centralises user authentication and authorization, reducing the need for multiple login credentials and improving the user experience. Additionally, Azure SAML 2.0 ensures secure user authentication, allowing only authorised individuals to access company resources.

By leveraging Azure SAML 2.0 capabilities, companies can save time, enhance security, and improve their team's experience, making this integration a popular choice for many organisations using Tapt Teams.


Step-by-Step Guide

  1. Start by navigating to Enterprise Applications on the Azure Admin Portal.

  2. Click on "New Application" to access the Azure AD Gallery.

  3. Choose "Create your own application" and name it "Tapt SSO." Select "Integrate any other application you don't find in the gallery (Non-gallery)" and click "Create."


  4. Select "Set up single sign-on" and then choose "SAML."

  5. In the "Set up Single Sign-On with SAML" section, click Edit in the "Basic SAML Configuration" pane.

    • For "Identifier (Entity ID)," add the identifier: urn:tapt.io:saml-sso

    • For "Reply URL (Assertion Consumer Service URL)," add the reply URL from the SSO section on your dashboard's integration tab.


  6. Upload the enterprise application metadata file in XML format to your Tapt dashboard to complete the link.


  7. Once step 6 is confirmed, proceed to add Users or groups to the SAML integration for testing SAML login. Users or groups can be added via the "Users and groups" tab.


Logging in with SAML via Desktop

For enhanced security and streamlined access to the Tapt dashboard, users can log in via SAML protocol on desktop:

  • Access the Tapt enterprise tile typically available at https://myapplications.microsoft.com/ from the user's Microsoft dashboard of applications, provided they are part of the provisioned groups.

  • Clicking the application tile redirects the user to Tapt, instantly logging them in and ensuring a secure authentication process for a seamless user experience.

Did this answer your question?