The Microsoft Entra ID (formerly Active Directory) integration will allow you to authenticate the users of your Progressive Web App or Approvals solution against your own existing Entra ID user pool. CivicPlus's Entra ID integration uses SAML (Security Assertion Markup Language) 2.0.
Important Note
- This integration is separate from the Custom IdP (Identity Provider) integration with Entra ID and CivicPlus.
Configure Entra ID App
- To use the integration, you must have an Entra ID App configured. In the example below, we are using the Enterprise application and choosing the Integrate any other application you don't find in the gallery (Non-gallery) option.
Progressive Web App Instructions
- Sign in to your site
- Navigate to Apps and click Manage on your app
- Navigate to the Developer Tools tab
- Click the Configure SAML button under Integrate with a SAML SSO Provider
- Follow the SAML Configuration & Instructions
-
Entra ID Setup
- Create a Single Sign-On application in your Entra ID
- Copy the Identifier (Entity ID) into your application configuration
- Copy the Reply URL (Assertion Consumer Service URL) into your application configuration
- Copy the App Federation Metadata URL from your Single Sign-On application
- App Federation Metadata Url: Enter the URL you copied from your application
- Mapping Additional User Details: The listed claims can be added to your Single Sign-On application which will be included in the submission data
-
Entra ID Setup
- Click SaveNote: After clicking the Save button, users will be redirected straight to your Entra ID login screen when clicking the Login button in this app.
Approvals Instructions
- Sign in to your site
- Navigate to the Approvals tab
- Select the Approvers tab
-
Enable the Integrate with a SAML SSO Provider toggle
- Click Edit Groups to configure the groups assigned to your SAML users
Note: Your existing groups will not carry over as SAML groups. These will need to be reconfigured if you have existing flows using the same group name. - Click Add Group
- Add a group name and enter the notification email addresses for the group
Note: To ensure your users have access to the correct approvals, you will need to map the configured group name to your SAML user claims. - Click Save
- Follow the SAML Configuration & Instructions for your Entra ID / Active Directory integration
-
Entra ID Setup
- Create a Single Sign-On application in your Entra ID
- Copy the Identifier (Entity ID) into your application configuration
- Copy the Reply URL (Assertion Consumer Service URL) into your application configuration
- Copy the App Federation Metadata URL from your Single Sign-On application
- App Federation Metadata Url: Enter the URL you copied from your application
-
Mapping Additional User Details: The listed claims can be added to your Single Sign-On application, which will be included in the submission data
Note: To ensure your users have access to the correct approvals, you will need to map the configured group name to your SAML user claims.
-
Entra ID Setup
- Click Save
Comments
Let us know what was helpful or not helpful about the article.0 comments
Please sign in to leave a comment.