All Collections
Single Sign On (SSO) Integration
How to connect Microsoft Azure SSO
How to connect Microsoft Azure SSO

Find out how to set up Microsoft Azure SSO on AirMason

Judith avatar
Written by Judith
Updated over a week ago

Organization URL:

In this article, we'll be referencing this EmployeePortalURL. You can get this information when you log into AirMason Admin and click Manage Organization. If you do not have access to AirMason Admin, please contact your team to add you as a collaborator.

If you've custom domain setup on AirMason
- then your Employee Portal URL will be your custom domain (Eg: handbooks.johnsmithweb.com)
- otherwise it will be books.airmason.com/<company-handle>, where <company-handle> is company handle that you've set up. (Eg: books.airmason.com/johnsmith)


Setting up AirMason app on Azure


2. Click on Azure Active Directory

Click on Azure Active Directory

3. Click on +Add

Click on +Add

4. Select Enterprise application

Select Enterprise application

5. Click on +Create your own application

Click on +Create your own application

6. Name the applicate AirMason App

Select "Integrate any other application you don't find in the gallery (Non-gallery)"

Name the applicate AirMason App

7. Click on Create

Click on Create

8. Click Set up single sign on

Click Set up single sign on

9. Click SAML

Click SAML

10. Click on Edit in Basic SAML configuration

Click on Edit in Basic SAML configuration

11. Click on Add identifier

Click on Add identifier

12. Type in the https://{{AirMasonorganizationURL}}/ms_adfs/saml2

Type in the https://{{AirMasonorganizationURL}}/ms_adfs/saml2
You can find this in AirMason configurations. If you have an active custom domain, please use that instead.

Type in the https://{{AirMasonorganizationURL}}/ms_adfs/saml2

13. Click on Add reply URL

Click on Add reply URL

14. Type in the https://{{AirMasonorganizationURL}}/ms_adfs/saml2

Type in the https://{{AirMasonorganizationURL}}/ms_adfs/saml2
You can find this in AirMason configurations. If you have an active custom domain, please use that instead.

Type in the https://{{AirMasonorganizationURL}}/ms_adfs/saml2

15. Click on Save

Click on Save

16. Click on Edit user attributes & claims

Click on Edit user attributes &amp; claims

17. Click on the first additional claim

Click on the first additional claim

18. Delete the content in the Namespace

Delete the content in the Namespace

19. Update emailAddress to email

Update emailAddress to email

20. Click Save

Click Save

21. Click on the second claim

Click on the second claim

22. Update name to be firstName

Update name to be firstName

23. Delete the content in the Namespace

Delete the content in the Namespace

24. Click on Save

Click on Save

25. Click on three dots next to the userprincipalname

Click on three dots next to the userprincipalname

26. Click on Delete

Click on Delete
Click on <a href="http://schemas.xmlsoap.org/ws/2005/05/identity/claims/surname" rel="nofollow noopener noreferrer" target="_blank">http://schemas.xmlsoap.org/ws/2005/05/identity/claims/surname</a>

28. Update name to be lastName

Update name to be lastName

29. Delete the content in the Namespace

Delete the content in the Namespace

30. Click on Save

Click on Save

31. Click on Close

Click on Close

32. Copy Azure AD identifier under Set up AirMason App

Copy Azure AD identifier under Set up AirMason App

If you do not have access to AirMason Admin, please contact your admin team to add you as a collaborator

34. Click on Connect next to the Azure integration

Click on Connect next to the Azure integration

35. Paste the Azure Identifier into Issue URL

Paste the Azure Identifier into Issue URL

36. Click on Properties

Click on Properties

37. Copy the User Access URL

Copy the User Access URL

38. Go Back to AirMason Admin integrations and paste the text under SAML 2.0 Endpoint

Go Back to AirMason Admin integrations and paste the text under SAML 2.0 Endpoint

39. Click Single sign-on on the left side

Click Single sign-on on the left side

40. Download the Federation Metadata XML

When you open the document, copy the X509 Certificate

Download the Federation Metadata XML

41. Paste the x509 certificate under Certificate

Paste the x509 certificate under Certificate

42. Click on Save

Click on Save

43. Assign users and groups access to the Appp

Click Users and groups on left side toolbar

Assign users and groups access to the Appp

44. Click on Add user/group

Click on Add user/group

45. Click on None Selected

Click on None Selected

46. Add the users and groups

Add the users and groups

47. Click on Select

Click on Select

48. Click on This information box links to an additional action. Activate it to execute the action.…

Click on This information box links to an additional action. Activate it to execute the action.…

49. Testing the integration

Click Single sign-on

Testing the integration

50. Click on Test

Click on Test

51. Success!

If the page redirects to AirMason employee portal where you will see any handbooks assigned to you. There may be no documents assigned if your admin is not ready to launch yet.

Success!

52. Alternatively, you can go to your AirMason employee URL and test it from there.

Alternatively, you can go to your AirMason employee URL and test it from there.

Did this answer your question?