Configuring SAML with Microsoft Azure

Award Force can be configured for single sign-on with Microsoft Azure and SAML. This means users of your Microsoft Azure portal don't have to register for a separate set of login credentials on Award Force. To configure this connection, follow the steps below.

Important: SAML is an optional add-on for your account. For more information and pricing, please get in touch with our client success team.
  1. Log into the Microsoft Azure portal go to All services then select Microsoft Entra ID.

    Screenshot of services in Microsoft Azure

  2. Select Add > Enterprise application from the menu.

    Screenshot of default directory
  3. Click Create your own application. Give it a name then click Create.
    Create your own application button in Azure

  4. Select Set up single sign on
    Set up single sign on

  5. Select SAML

    Screenshot of SAML button
  6. In the Basic SAML Configuration settings set the Identifier (Entity ID) and Reply URL (Assertion Consumer Service URL) as below but replace your_Award_Force_account_domain with the URL of your Award Force account.
  7. Award Force requires three attributes: firstName, lastName, and email which can be configured in the 'Attributes & Claims' section

    Screenshot of attributes and claims
    Screenshot of claims

    Note: you will need to set Name identifier format to Persistent. For the Additional claims please delete any values in the Namespace field.

    Screenshot showing where to set persistent name identifier
  8. Log into the Manage workspace your Award Force account and go to Settings > Users > Registration
  9. Under '3rd party authentication', select the SAML checkbox
    SAML checkbox for 3rd party authentication.png
  10. Copy and paste the Azure AD Identifier from Microsoft Azure to the Issuer field
  11. Copy and paste the Login URL from Microsoft Azure to the Single sign-on service URL
  12. Download the certificate from Microsoft Azure and copy and paste the text to the X.509 certificate field in Award Force.
    Note: the option to encrypt the assertion is optional. Depending on your identity provider requirements, a SAML public certificate or SAML certificate private key may be required.
  13. Save

A SAML login button will now be visible on your home page. Users who are logged into Microsoft Azure can click this button and be logged in to your Award Force account automatically. Alternatively you can provide a direct link from your own website to https://your_Award_Force_account_domain/saml/login.

Tip: be sure and replace the above example URL with your program's domain. 
Was this article helpful?
0 out of 0 found this helpful

Articles in this section

See more