Configure SSO with Azure AD
Azure Active Directory SSO for Forest Admin
Last updated
Azure Active Directory SSO for Forest Admin
Last updated
You must have one project in your organization with the plan Forest Admin Pro plan to access this feature.
In the Azure Active Directory admin center, add a new Enterprise application. Forest Admin is not listed in the Azure AD Gallery, so you must select Create your own application.
Select Integrate any other application you don’t find in the gallery (Non-gallery) and follow the wizard.
Fill in all required parameters as shown in the table bellow.
Navigate to SAML Signing Certificate section, and copy the App Federation Metadata Url
head to Forest Admin, select XML file upload or XML file endpoint and paste the App Federation Metadata Url
to the Metadata XML endpoint.
You can perform some tests before enabling it for your whole company..
Setting | Description | Value |
---|---|---|
Check the steps below this if you encounter an issue:
Double check all information (endpoints, certificate expiration dates, etc..)
Make sure the nameID
configured on your Identity Provider is the email address used on Forest Admin accounts
Reply URL (Assertion Consumer Service URL)*
Assertion Consumer Service URL is responsible for receiving the SAML response
https://api.forestadmin.com/api/saml/callback
Sign on URL*
Sign on URL
https://api.forestadmin.com/api/saml/callback
Identifier (Entity ID)
This is a globally unique name that Forest Admin gives you (Unique User ID
).
forestadmin-OrganizationName
(Optional) Logout URL
Redirected to this location after logout
https://app.forestadmin.com/login
(Optional) Relay State
Only useful for IDP-initiated login
{"organizationName": "<OrganizationName>", "destinationUrl": "organization.projects"}