Book a Demo

Set up AZURE Active Directory SSO with Cloudmore

Aug 30, 2019 12:39:05 PM

Note! This set-up guide is for customers that are using the Cloudmore.com domain name to log into Cloudmore. 

Cloudmore supports single sign-on (SSO) with SAML Single Sign-On.

SSO will enable you to manage your users and their level of access to Cloudmore in one central location. Advanced password rules or multifactor authentication (MFA) will be required.

This guide will help you to set up SSO with Microsoft Azure Active Directory (Azure AD).

The Requirements

To get started, you need the following items:

  • An Azure AD subscription
  • An account in Azure that allows you to create Azure Enterprise Applications

Cloud Service Brokers are required to set up their Azure Enterprise application in their Azure AD. Each Azure Enterprise application requires the completion of a manual step so that the Azure AD Federation Metadata can be sent to Cloudmore.

An Azure user account needs to have a corresponding account in Cloudmore to be able to use SSO. Access levels and permissions are all handled in Cloudmore.

The Cloudmore user account should also have a username that matches the mail attribute of the SSO claim. You can either use the AD user’s user.mail property or configure another field to be sent to the mail property, as long as the name is formatted as an email address and matches the user's username in Cloudmore.

If you want to prevent your users from logging into Cloudmore directly, please create long, complex passwords that you don’t share with your users.

Setting Up an Azure Enterprise Application

1. Sign into the Azure portal (https://portal.azure.com).

2. On the left navigation pane, select the Azure Active Directory.

3. Navigate to Enterprise Applications.

4. Click the New application button at the top.

5. Search for Cloudmore in the Add from gallery search box and click on the Cloudmore App. Then click on Add button in the menu on the right. 




6. Wait for the success message that tells you that your Enterprise application has been created.

7. Click the Users and groups option under Manage from the navigation pane.

8. Here you can add the users that should already have access to this Enterprise application and use single sign-on. Add at least one user to test by clicking the Add user button at the top.

9. Click on the Users and groups option to select users.

10. Use the search tab to find the user you are looking for and add them by clicking on them. They will now show up under Selected members.

11. Click on the Select button at the bottom when you have finished selecting members.

12. Click on the Assign button at the bottom to assign the selected users to the Enterprise application.

13. Click the Single sign-on option under Manage from the navigation panel.

14. Click the SAML option.
.                            .

15. Scroll down to the 2 section named User Attributes & Claims and click on the pen.

16. Click the Add new claim button at the top.

17. In the Name field enter: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/mail and select user.mail from the Source attribute dropdown.

If your users are not using Microsoft O365 Exchange you can map it to the user.userprinciplename instead by selecting it from the Source Attribute dropdown. This will map it to the user's username. 

18. Click the Save button at the bottom.

19. Click the X at the top right corner to close the User Attributes & Claims Click No, I’ll test later again. 

20. Scroll down to section 4 called 'Set up Cloudmore' (if you selected another name for your Enterprise application in Step 6 it will say that instead) and click the copy button next to the Azure AD Identifier. We need to copy this value to Cloudmore.

21. Now use a separate tab to log into Cloudmore. 

22. Navigate to the Cloud Service Broker or organization that should be enabled for SSO and go to the Security center.     

23. Scroll down to the SSO section and click the checkbox called Enable saml sso.         

24. In the Identity Provider entityID, enter the value you copied from the Azure AD identifier from step 20.

25. Click on the Update button to save your changes.

26. Go back to the Azure portal tab.

27. In section 3, called SAML Signing Certificate, click on the Download text next to the Federation Metadata XML.

28. Your federation metadata XML will start to download. This file should be sent to platformsupport@cloudmore.com to get you set up in Cloudmore. 

29. Once we have confirmed that your Federation Metadata XML has been set up you can proceed to testing.


Now everything should be set up and working. You have several options to test your SSO setup. You can navigate back to the Azure portal and click on the test button at the bottom.

Or, you can go to the Cloudmore login page and click on the Log in via your home company and enter your username.

Microsoft has a browser extension which allows you to quickly sign into Enterprise applications. Useful links and information on Microsoft’s browser add-ons can be found here.

Subscribe by Email

No Comments Yet

Let us know what you think