To configure Microsoft Entra integration with Uberflip, you need the following items:
A Microsoft Entra subscription. If you don't have an Azure subscription, create a free account before you begin.
An Uberflip subscription with single sign-on enabled.
Scenario description
In this article, you configure and test Microsoft Entra single sign-on in a test environment.
Uberflip supports the following features:
SP-initiated and IDP-initiated single sign-on (SSO).
Just-in-time user provisioning.
Add Uberflip from the Azure Marketplace
To configure the integration of Uberflip into Microsoft Entra ID, you need to add Uberflip from the Azure Marketplace to your list of managed SaaS apps:
Browse to Identity > Applications > Enterprise applications > New application.
In the search box, enter Uberflip. In the search results, select Uberflip, and then select Add to add the application.
Configure and test Microsoft Entra single sign-on
In this section, you configure and test Microsoft Entra single sign-on with Uberflip based on a test user named B Simon. For single sign-on to work, you need to establish a link between a Microsoft Entra user and a related user in Uberflip.
To configure and test Microsoft Entra single sign-on with Uberflip, you need to complete the following building blocks:
Browse to Identity > Applications > Enterprise applications > Uberflip application integration page, select Single sign-on.
In the Select a single sign-on method pane, select SAML/WS-Fed mode to enable single sign-on.
On the Set up Single Sign-On with SAML pane, select Edit (the pencil icon) to open the Basic SAML Configuration pane.
On the Basic SAML Configuration pane, do one of the following steps, depending on which SSO mode you want to configure:
To configure the application in IDP-initiated SSO mode, in the Reply URL (Assertion Consumer Service URL) box, enter a URL by using the following pattern:
This value isn't real. Update this value with the actual reply URL. To get the actual value, contact the Uberflip support team. You can also refer to the patterns shown in the Basic SAML Configuration pane.
To configure the application in SP-initiated SSO mode, select Set additional URLs, and in the Sign-on URL box, enter this URL:
https://app.uberflip.com/users/login
On the Set up Single Sign-On with SAML pane, in the SAML Signing Certificate section, select Download to download the Federation Metadata XML from the given options and save it on your computer.
In the Set up Uberflip pane, copy the URL or URLs that you need:
Login URL
Microsoft Entra Identifier
Logout URL
Configure Uberflip single sign-on
To configure single sign-on on the Uberflip side, you need to send the downloaded Federation Metadata XML and the appropriate copied URLs to the Uberflip support team. The Uberflip team will make sure the SAML SSO connection is set properly on both sides.
Create a Microsoft Entra test user
In this section, you create a test user named B. Simon.
Select New user > Create new user, at the top of the screen.
In the User properties, follow these steps:
In the Display name field, enter B.Simon.
In the User principal name field, enter the username@companydomain.extension. For example, B.Simon@contoso.com.
Select the Show password check box, and then write down the value that's displayed in the Password box.
Select Review + create.
Select Create.
Assign the Microsoft Entra test user
In this section, you enable B. Simon to use Azure single sign-on by granting their access to Uberflip.
Browse to Identity > Applications > Enterprise applications > Uberflip.
In the applications list, select Uberflip.
In the left pane, under MANAGE, select Users and groups.
Select + Add user, and then select Users and groups in the Add Assignment pane.
In the Users and groups pane, select B Simon in the Users list, and then choose Select at the bottom of the pane.
If you're expecting a role value in the SAML assertion, then in the Select Role pane, select the appropriate role for the user from the list. At the bottom of the pane, choose Select.
In the Add Assignment pane, select Assign.
Create an Uberflip test user
A user named B. Simon is now created in Uberflip. You don't have to do anything to create this user. Uberflip supports just-in-time user provisioning, which is enabled by default. If a user named B. Simon doesn't already exist in Uberflip, a new one is created after authentication.
In this section, you test your Microsoft Entra single sign-on configuration by using the My Apps portal.
When you select Uberflip in the My Apps portal, you should be automatically signed in to the Uberflip subscription for which you set up single sign-on. For more information about the My Apps portal, see Access and use apps on the My Apps portal.
Descubra cómo Id. externa de Microsoft Entra puede proporcionar experiencias de inicio de sesión seguras y sin problemas para los consumidores y clientes empresariales. Explore la creación de inquilinos, el registro de aplicaciones, la personalización de flujo y la seguridad de la cuenta.
Muestre las características de Microsoft Entra ID para modernizar las soluciones de identidad, implementar soluciones híbridas e implementar la gobernanza de identidades.