myPolicies Help

Setting up Azure AD as your SSO provider for myPolicies.

3 minute read

Need More Answers?

Setting up Azure AD as your SSO provider for myPolicies.

  1. In Entra ID / Azure AD Browse to:
  2. Using your admin portal access Entra ID.
  3. Manage > Enterprise Applications.
  4. + New application.
  5. + Create your Own Application.
  6. Enter your application name (Ex: myPolicies) Do not use the recommended application in the gallery.
  7. What are you looking to do with your application? Select option “Integrate any other application you don’t find in the gallery (Non-gallery)”.
  8. Click on “Create”
  9. Select “Setup Single Sign On” with SAML. At this point you should be on the Application Page.
  10. You will now be presented a page with 5 steps listed.

Enter Basic SAML setup information:
Identifier (Entity Id): https://<your-tenant>.mypolicies.com
Reply URL: https://<your-tenant>.mypolicies.com/users/auth/saml/callback

Note: If setting up multiple AD SSO/SAML providers fill in the optional RelayState field with a meaningful name within your organization, the purpose of the name specified here will be used on myPolicies Sign-On screen for your readers and admins to select at login. 

 Please contact us to complete and validate the setup support@mypolicies.com.

 
  1. Next: Update attribute claims.

    Entra ID / Azure AD Document for creating claims can be found here(LINK).

    myPolicies Attribute (Claim Name)                    Azure AD attribute (Source Attribute)
    name* user.userprinicpalname 
    title user.jobtitle
    email * user.mail 
    lastName * user.surname 
    firstName * user.givenname 
    department user.department
    city user.city
    countryCode user.country
    organization user.companyName
    state user.state
    zipCode user.postalcode
    ** You can map additional fields if required **
  2. From the SAML Signing Certificate Area:
    Send the base64 certificate (in a .txt file) to your myPolicies representative, as well as, your sign-on url.  In Entra ID / Azure AD it is referred to as the User access URL located in the Manage > Properties section of the Enterprise App setup.  ( The following link can provide additional details: https://docs.microsoft.com/en-us/azure/active-directory/manage-apps/configure-federated-single-sign-on-gallery-applications )
  3. Once you have confirmation from your myPolicies Representative that the information has been entered in our system. You can test your app.
  4. Once confirmed this integration has been successfully setup the last step is to assign Users/Groups which will allow your organization to have access to myPolicies.  At sign-on the user account will be created in myPolicies as per the claims and attributes specified above.

Still have questions?

Contact Us