IdP-Initiated SAML Login for Azure SSO

Prev Next

For IdP-initiated SAML SSO with Microsoft Entra ID (Azure AD),  you configure Entra ID as the Identity Provider (IdP) and your application (Service Provider) to accept unsolicited SAML assertions.

  1. Sign in to Wasabi Console (https://console.wasabisys.com/login).

  2. Select Security in the navigation menu, then click SSO (Single Sign On). The SAML Connection pane is displayed.

  3. Scroll down to the IdP-initiated login section, enable the login toggle, then click Save.

  4. Verify that the Callback URL includes the Root ARN.

  5. Copy the Callback URL.

  6. In the Microsoft Entra ID (Azure AD) application, navigate to Enterprise Applications, then All Applications.

  7. Select your application.

  8. Go to Set Up Single Sign On, and click Edit in Basic SAML Configuration to enter the following information:

    • Identifier (Entity ID)—https://sso.wasabisys.com/saml

    • Reply URL (Assertion Consumer Service URL)—Paste the Callback URL previously copied from the SSO settings in the Wasabi Console.

  9. To test the IdP-initiated login, go to the section Test single sign-on with SSO Wasabi and click Test. Or, go to your Apps Dashboard and select your Enterprise Applications tile to verify.