Setting up Azure AD as your SSO provider for myPolicies.
3 minute read
Need More Answers?
General
Logging Into myPolicies
Acknowledging a Policy
Downloading My Policy Book
Admin
Traditional User Login Feature
Manage Accounts Using Bulk CSV File Upload
Review Frequency - Document Reviews
Tracking and Reporting
View Document Library
Create and Manage Your Policy Book
Setting up Azure AD as your SSO provider for myPolicies.
- In Entra ID / Azure AD Browse to:
- Using your admin portal access Entra ID.
- Manage > Enterprise Applications.
- + New application.
- + Create your Own Application.
- Enter your application name (Ex: myPolicies) Do not use the recommended application in the gallery.
- What are you looking to do with your application? Select option “Integrate any other application you don’t find in the gallery (Non-gallery)”.
- Click on “Create”
- Select “Setup Single Sign On” with SAML. At this point you should be on the Application Page.
- You will now be presented a page with 5 steps listed.
Enter Basic SAML setup information:
Identifier (Entity Id): https://<your-tenant>.mypolicies.com
Reply URL: https://<your-tenant>.mypolicies.com/users/auth/saml/callback
Note: If setting up multiple AD SSO/SAML providers fill in the optional RelayState field with a meaningful name within your organization, the purpose of the name specified here will be used on myPolicies Sign-On screen for your readers and admins to select at login.
Please contact us to complete and validate the setup support@mypolicies.com.
- Next: Update attribute claims.
Entra ID / Azure AD Document for creating claims can be found here(LINK).
myPolicies Attribute (Claim Name) Azure AD attribute (Source Attribute) name* user.userprinicpalname title user.jobtitle email * user.mail lastName * user.surname firstName * user.givenname department user.department city user.city countryCode user.country organization user.companyName state user.state zipCode user.postalcode ** You can map additional fields if required ** - From the SAML Signing Certificate Area:
Send the base64 certificate (in a .txt file) to your myPolicies representative, as well as, your sign-on url. In Entra ID / Azure AD it is referred to as the User access URL located in the Manage > Properties section of the Enterprise App setup. ( The following link can provide additional details: https://docs.microsoft.com/en-us/azure/active-directory/manage-apps/configure-federated-single-sign-on-gallery-applications ) - Once you have confirmation from your myPolicies Representative that the information has been entered in our system. You can test your app.
- Once confirmed this integration has been successfully setup the last step is to assign Users/Groups which will allow your organization to have access to myPolicies. At sign-on the user account will be created in myPolicies as per the claims and attributes specified above.