Setting a custom SAML in Azure AD

  • Enterprise

The steps in this topic describe how to configure a custom SAML application in Azure AD.

Configuration

Before you set up a custom SAML application in Azure Active Directory (AD), you must configure SSO in Postman. Select “AD FS” as the “Authentication Type” and allow “Identity Provider Details” to remain empty for now.

ad fs

Next, sign in to the Azure management portal using your Azure Active Directory administrator account.

Browse to the Azure Active Directory > [Directory] > Enterprise Applications, and select “New Application”.

Select “Non-gallery application”.

non gallery app

Enter the name of the application and click “Add”.

add postman app

Assign a test user to the application. (Required)

azure app quickstart

In the “Configure Single Sign-on” section, select “SAML-based Sign-on” in the “Single Sign-on Mode” dropdown.

sso saml

Configure the SAML integration. The table below describes the values of the fields in this configuration.

configure saml

Table: Field description for SAML integration

Field Value
Identifier The Entity ID for your Postman custom SSO auth. You can find it in the Team page.
Reply URL The ACS URL for your Postman custom SSO auth. You can find it in the Team page.
User Identifier Select user.mail from the dropdown

Download the “SAML Signing Certificate” (Base64 format) and click the Save button.

After the setup is complete, submit your Identity Provider details to Postman. For more information, see Intro to SSO The table below describes the values of the fields in this configuration.

Table: Field description for SAML Signing Certificate

Field Value
Identity Provider Issuer The SAML Entity ID of your Azure AD application.
Identity Provider SSO URL The SAML Single Sign-on Service URL of your Azure AD application.
X.509 Certificate Contents of the SAML Signing Certificate file.