Configuration of your SAML Provider
In this manual, we use Azure AD as our Identity Provider to manage our identities and therefore to configure our SAMP Provider. You can use any other solution that supports the SAML 2.0 protocol.
First, you need to Create your own application in the Azure enterprise applications.
Once the application is created, you can make the necessary configurations under Single sign-on.
In there, you will need to add Identifier (Entity ID), Reply URL and Sign-on URL. You can copy all three URLs from the Onventis Buyer SAML configuration view:
When the Basic SAML configuration is filled in, you can start with step number two and enter the SAML attributes.
email
The address is used as a unique identifier by our Identity ProviderfirstName & lastName
Helping us with our support use-cases and used for addressing users on UI and in emailspreferredUsername
Used to link an identity between our IDP and the Onventis Buyer application. It is maintained as “External user name” field (Excel field name “ExternalUserId”) in the user master data in the “Advanced” tab of Onventis Buyer. So you are able to change the External user name as you wish to in order to create matching between the SAML user and the Onventis Buyer user.
To create the matching entry in Onventis Buyer you can add the preferredUsername to the ExternalUserId field of the user. This can be done either via import job or via the Onventis Buyer UI.
To make these attributes part of your SAML request, you must set up a claim mapping in your SAML provider. A claim is information, that an identity provider specifies about a user in the XML it issues to that user. In the SAML protocol, this data is usually included in the SAML attribute statement.
When configuring the claim mapping, please make sure on all Claims, to have an empty Namespace URI, otherwise the communication will fail:
After finishing with all values, the claim mapping in your Azure application could look like the following:
Additional attributes that are sent will be ignored. When claims are mapped correctly, the AttributeStatements in the SAML communication will look like the following example:
When the configuration of your SAML Provider is finished, you can copy the Azure-generated metadata URL. You can find it under Single sign-on configuration → #3 SAML Certificates section → App Federation metadata Url.