Topics included in this article:
Step by Step Instructions
Below are the steps necessary to setup single sign-on with Office 365/Microsoft Azure AD.
1) Access the Azure Active Directory Portal (https://aad.portal.azure.com/) and create a new application named "Rhombus Systems".
2) Assign users and groups to the application.
3) Ensure that corresponding roles have been created in the Rhombus web console that match the role names in AD in spelling, case and white space.
4) Edit the "Basic SAML Configuration" by copying and pasting the information from the SSO page on the Rhombus web console.
5) Edit the "User Attributes & Claims" so that the "Unique User Identifier" is set to "user.mail". Note: depending on the configuration of the user or group, this may need to be set to "user.userprinciplename".
Next, click the "Add new claim" at the top of the "User Attributes & Claims" edit page and add the following Role claim:
Namespace should be set to http://schemas.xmlsoap.org/ws/2005/05/identity/claims/roles/Roles
Your "User Attributes & Claims" should look something like this:
6) Download the MetaData XML and paste it in the "IDP MetaData XML" field in the Rhombus Single Sign-On Settings page.
7) Edit The Metadata XML by adding the NameIDFormat Attribute as show below:
Add the following line in the XML within the IDPSSODescriptor as shown below
If you are using a SAML 2.0, you may need to add the appropriate "md" prefixes to the XML tags to match the format.
8) Click "Save" on the Rhombus web console SSO page.
9) Now when users try to login to Rhombus, they will be redirected to login through AD. If JIT is not enabled, each user will need to be created in Rhombus before logging in.
SCIM setup with Azure
If you also want to setup SCIM provisioning with Azure, we have you covered. Checkout our step by step for setting this up on our other article: How to configure SCIM 2.0 with Azure