SSO with Azure AD using SAML
Overview
This guide provides step-by-step instructions for configuring SAML 2.0 Single Sign-On (SSO) between Microsoft Azure Active Directory and Bambuser Virtual Commerce. This integration allows your organization to manage user authentication through your existing Azure AD infrastructure.
For a more seamless experience with automated user provisioning, we recommend using our native Microsoft Azure AD OIDC integration.
Prerequisites
- Administrative access to Microsoft Azure AD
- A verified domain for user email addresses
Manage Users
permission in Bambuser dashboard
Step 1: Register a New Application in Azure
- Sign in to the Azure Portal
- Navigate to Azure Active Directory > Enterprise applications
- Click New application
- Select Create your own application
- Enter a name (e.g., "Bambuser SAML") and select Integrate any other application you don't find in the gallery (Non-gallery)
- Click Create
Step 2: Configure Single Sign-On
- In your new application, go to Manage > Single sign-on
- Select SAML as the single sign-on method
Step 3: Configure Basic SAML Settings
- In the Basic SAML Configuration section, click Edit
- Enter the following values:
- Identifier (Entity ID):
bambuser_saml_service_provider
- Reply URL (Assertion Consumer Service URL):
- US:
https://svc-prod-us.liveshopping.bambuser.com/functions/auth/sso/saml/callback
- EU:
https://svc-prod-eu.liveshopping.bambuser.com/functions/auth/sso/saml/callback
- US:
- Identifier (Entity ID):
- Click Save
Step 4: Configure Claims
- In the Attributes & Claims section, click Edit
- Make sure you have the following claims:
Claim name Type Value Require? email
SAML
user.mail
Yes firstName
SAML
user.givenName
Optional lastName
SAML
user.surname
Optional nameID
SAML
user.userPrincipalName
Optional groups
SAML
user.groups
Optional - Click Save
Step 5: Configure User Assignment
- In the application's Properties section, set User assignment required? to Yes
- Go to Users and groups to assign users or groups to the application
Step 5: Share Configuration with Bambuser
Contact your Bambuser representative and provide the following information:
Required Information
- Domain: Your organization's email domain (e.g.,
yourcompany.com
) - SAML Certificate: Download the Base64 certificate from the **SAML Certificates ** section
- Login URL: Found in the Set up [Application Name] section
- Azure AD Identifier: Found in the Set up [Application Name] section
- Logout URL: (Optional) If you want to enable single sign-out
Metadata XML file
Alternatively, you can share the federation metadata XML file from the **SAML Certificates ** section. This file will include all information needed to configure SAML SSO.
Step 6: Configure User Access
Option A: Manual User Management (Default)
Manage users/roles manually in the Bambuser dashboard.
For each new user:
- Add them to your Azure AD
- Manually create their account in the Bambuser dashboard
- Assign appropriate roles and permissions on the Bambuser dashboard
Option B: Group-based Management (Recommended)
Manage users/roles through groups in Azure AD:
- In Azure AD, create groups for different permission levels (e.g.,
bambuser-owner
,bambuser-moderator
) - Share the group names with your Bambuser representative
- Bambuser team will map these groups to existing roles in Bambuser ecosystem
Step 6: Test and Verify Your Integration
Once the SAML configuration is completed by Bambuser on your workspace, test the integration:
-
Test authentication flow
-
Verify user attributes
- Check that user details (name, email) are correctly passed
- Verify role assignments
If you have a separate Bambuser workspace for testing, you can ask us to set up a separate SAML integration for testing.
- Use a test domain (e.g.,
test.yourcompany.com
) to avoid impacting production users - Create test users in Azure AD
Support
For assistance, contact:
- Your dedicated Bambuser representative
- Or our support team at support@bambuser.com (Subject: "Azure SAML Integration")
Optional: Automated User Provisioning (SCIM)
For organizations requiring automated user provisioning and deprovisioning, you can implement a custom SCIM (System for Cross-domain Identity Management) integration using our public API. This allows for:
- Automatic user creation when added to your Azure AD
- Role and permission synchronization
- Immediate access revocation when users are deprovisioned
To implement SCIM integration:
- Review our API documentation for user management endpoints
- Develop a SCIM service that interfaces with Azure AD
- Contact support to enable the necessary API access
SCIM implementation requires development resources and is recommended for organizations with significant user management needs.