content/operate/rc/security/access-control/saml-sso/saml-integration-azure-ad.md
This guide shows how to configure Microsoft Entra (formerly Azure Active Directory) as a SAML single sign-on identity provider (IdP) for your Redis Cloud account.
To learn more about Redis Cloud support for SAML, see [SAML single sign on]({{< relref "/operate/rc/security/access-control/saml-sso" >}}).
Before completing this guide, you must [verify ownership of any domains]({{< relref "/operate/rc/security/access-control/saml-sso#verify-domain" >}}) you want to associate with your SAML setup.
To create the Microsoft Entra SAML Toolkit integration application:
Sign in to your Microsoft Azure account.
From the main menu, select Microsoft Entra ID > Enterprise Applications. Select New application to add a new application.
{{<image filename="images/rc/saml/ad_saml_1.png" >}}
Select Microsoft Entra SAML Toolkit from the list of apps.
{{<image filename="images/rc/saml/ad_saml_2.png" >}}
Name the application Redis Cloud and then select Create.
{{<image filename="images/rc/saml/ad_saml_3.png" >}}
Select Properties and upload the Redis logo.
{{<image filename="images/rc/saml/ad_saml_17.png" >}}
Select Save.
Once you've created the application, go to the Application Overview and select Set up single sign on.
{{<image filename="images/rc/saml/ad_saml_4.png" >}}
Select SAML as the single sign-on method.
{{<image filename="images/rc/saml/ad_saml_5.png" >}}
Go to Step 1 in the configuration screen and select Edit.
Enter some mock data in the required fields.
{{<image filename="images/rc/saml/ad_saml_8.png" >}}
Select Save to save your changes.
Go to Step 3 in the configuration screen.
Certificate (Base 64) is required to complete SAML configuration in the Redis Cloud console. Select Download to download it.
{{<image filename="images/rc/saml/ad_saml_7.png" >}}
Go to Step 4 in the configuration screen, and note down or copy the following information:
{{<image filename="images/rc/saml/ad_saml_6.png" >}}
Now that you have your Entra IdP server ready, configure support for SAML in Redis Cloud.
Sign in to your account on the Redis Cloud console.
To activate SAML, you must have a local user (or social sign-on user) with the owner role. If you have the correct permissions, you will see the Single Sign-On tab.
Fill in the information you saved previously in the setup form. This includes :
Issuer (IdP Entity ID): Microsoft Entra Identifier
IdP server URL: Login URL
Assertion signing certificate: Drag-and-drop the certificate file you downloaded to disk in the form text area
{{<image filename="images/rc/saml/sm_saml_1.png" >}}
Once you click the Enable button, wait a few seconds for the status to change.
You will then be able to download the service provider (SP) metadata. Save the file to your local hard disk.
{{<image filename="images/rc/saml/sm_saml_3.png" >}}
Open the file in any text editor. Save the following text from the metadata:
{{<image filename="images/rc/saml/sm_saml_4.png" >}}
{{<image filename="images/rc/saml/sm_saml_5.png" >}}
Go back to Microsoft Entra ID setup and Edit the Basic SAML Configuration in Step 1.
This is where you entered mock data. Let's now enter the correct data for this step.
{{< note >}}
For the EntityID and Location fields below you can directly upload the metadata file using the option at the top of the page. However, you will still need to manually add the Sign on URL.
{{< /note >}}
Paste EntityID information in the Identifier (Entity ID) field.
Paste Location link in Reply URL (Assertion Consumer Service URL) field.
For the Sign on URL field, add URL https://cloud.redis.io/#/login/?idpId= where you need to add the ID from the Reply URL ID, for example, https://cloud.redis.io/#/login/?idpId=0oa5pwatz2JfpfCb91d7.
Select Save.
{{<image filename="images/rc/saml/ad_saml_23.png" >}}
Go to step 2, Attributes & Claims and select Edit.
{{<image filename="images/rc/saml/ad_saml_24.png" >}}
Configure these attributes and claims:
Modify Unique User Identifier (Name ID) to user.mail
Modify additional claims to match SAML assertion as follows:
Email: user.mail
FirstName: user.givenname
LastName: user.surname
redisAccountMapping: "<sm_account_id>=owner"
redisAccountMapping contains Redis Cloud account IDs and user roles pairs. The key-value pair consists of the lowercase role name (owner, member, manager, billing_admin, or viewer) and your Redis Cloud Account ID found in the [account settings]({{< relref "/operate/rc/accounts/account-settings" >}}).{{<image filename="images/rc/saml/ad_saml_14.png" >}}
{{<note>}} Make sure the Namespace field is empty when modifying these claims.
{{<image filename="images/rc/saml/ad_saml_namespace_field.png" >}} {{</note>}}
To add a user to the application, select User and Groups > Add user/group.
{{<image filename="images/rc/saml/ad_saml_15.png" >}}
Add the user and select Assign.
{{<image filename="images/rc/saml/ad_saml_16.png" >}}
Return to Redis Cloud console and select Activate.
{{<image filename="images/rc/saml/sm_saml_8.png" >}}
A popup appears, explaining that you must log in with the credentials of a Microsoft Entra user to test the SAML connection. Select Continue to go to the Microsoft login screen.
The Microsoft login screen will appear. Enter the credentials and click Sign In.
{{<image filename="images/rc/saml/ad_saml_19.png" >}}
If everything is configured correctly, you will see the the Redis Cloud console screen. Your local account is now considered a SAML account.
To log in to the Redis Cloud console from now on, click on Sign in with SSO.
{{<image filename="images/rc/button-sign-in-sso.png" width="50px" alt="Sign in with SSO button">}}
If your users are going to be part of different Groups, you can create a Claim Condition for the redisAccountMapping attribute.
{{<image filename="images/rc/saml/ad_saml_20.png" >}}
If you correctly set the up the Sign on URL, the SAML application appears by default on the user's My Apps panel.
{{<image filename="images/rc/saml/ad_saml_25.png" >}}
While assigning the user to the app, a notification will appear:
{{<image filename="images/rc/saml/ad_saml_26.png" >}}
Therefore, if you sign into https://myapplications.microsoft.com/, the application will be available.
If the app is not available, make sure that the App is registered. It should be done automatically.
{{<image filename="images/rc/saml/ad_saml_27.png" >}}
{{<image filename="images/rc/saml/ad_saml_28.png" >}}
You can also access the app directly by using the User access Url from App Properties.