Configure SSO with Azure AD
Azure Active Directory SSO for Forest Admin
You must have one project in your organization with the plan Forest Admin Pro plan to access this feature.
Configuration
In the Azure Active Directory admin center, add a new Enterprise application. Forest Admin is not listed in the Azure AD Gallery, so you must select Create your own application.
Select Integrate any other application you don’t find in the gallery (Non-gallery) and follow the wizard.
Fill in all required parameters as shown in the table bellow.
Navigate to SAML Signing Certificate section, and copy the
App Federation Metadata Url
head to Forest Admin, select XML file upload or XML file endpoint and paste theApp Federation Metadata Url
to the Metadata XML endpoint.You can perform some tests before enabling it for your whole company..
Setting | Description | Value |
---|---|---|
Reply URL (Assertion Consumer Service URL)* | Assertion Consumer Service URL is responsible for receiving the SAML response |
|
Sign on URL* | Sign on URL |
|
Identifier (Entity ID) | This is a globally unique name that Forest Admin gives you ( |
|
(Optional) Logout URL | Redirected to this location after logout |
|
(Optional) Relay State | Only useful for IDP-initiated login |
|
Troubleshooting
Check the steps below this if you encounter an issue:
Double check all information (endpoints, certificate expiration dates, etc..)
Make sure the
nameID
configured on your Identity Provider is the email address used on Forest Admin accounts
Last updated