This guide walks you through connecting Microsoft Azure Active Directory (Azure AD) to AirMason using SAML Single Sign-On (SSO).
Before You Start
Before setting up Azure SSO, make sure:
You have administrator access to Microsoft Azure
You have access to AirMason Admin
You have been added as a collaborator on your AirMason account
If you do not have access, contact your organization’s AirMason admin.
Step 1: Find Your Employee Portal URL
You will need your Employee Portal URL during the Azure configuration.
Log into AirMason Admin
Go to Manage Organization
Click Employee Portal
Your portal URL will look like one of the following:
Default URL
https://books.airmason.com/<company-handle>
Example:
https://books.airmason.com/johnsmith
Custom Domain Example
https://handbooks.companydomain.com
If your organization uses a custom domain, use that domain instead of the default AirMason URL.
Step 2: Create the AirMason Application in Azure
Log into Microsoft Azure
Click Enterprise Applications
Click + New Application button
Click the + Create your own application button
Select the following:
Name: AirMason
Application Type:Integrate any other application you don't find in the gallery (Non-gallery)
Click Create.
Step 3: Enable Single Sign-On
Open the AirMason application you created. If you're coming from Step 2, you should already be there.
Click Single Sign-On on the left sidebar.
Select SAML.
Step 4: Configure Basic SAML Settings
Under Basic SAML Configuration, click Edit.
Enter the following values:
Identifier (Entity ID)
https://{{EmployeePortalURL}}/ms_adfs/saml2Reply URL (Assertion Consumer Service URL)
https://{{EmployeePortalURL}}/ms_adfs/saml2Example:
https://books.airmason.com/company/ms_adfs/saml2
OR
https://handbooks.company.com/ms_adfs/saml2
If your organization uses a custom domain, replace the URL accordingly.
Step 5: Configure User Attributes & Claims
Navigate to:
Single Sign-On → User Attributes & Claims
Update Email Claim
Click the first additional claim and update:
Field | Value |
Namespace | <delete this if present> |
Name | |
Source attribute | user.mail |
Update First Name Claim
Field | Value |
Namespace | <delete this if present> |
Name | firstname |
Source attribute | user.givenname |
Update Last Name Claim
Field | Value |
Namespace | <delete this if present> |
Name | lastname |
Source attribute | user.surname |
Step 6: Assign Users to the Application
Users must be assigned before they can log in.
In Azure, go to Users and Groups
Click Add user/group
Select the users or groups that should access AirMason
Click Assign
Step 7: Send SAML Details to AirMason
To complete the setup, send the following information to AirMason Support or Enter them directly in the Admin Portal:
Microsoft Entra Identifier:
Found in the Single Sign-On → Set up AirMason box
Signing Certificate (Base64):
Found in the Single Sign-On → SAML Certificates box
User access URL:
Found in the Properties tab on the left sidebar
Step 8: Test the Integration
After the setup is confirmed:
Navigate to your Employee Portal URL
Click Login with SSO
Sign in with your Microsoft Azure credentials
If configured correctly, you will be logged into AirMason automatically.









