All Collections
Administration
User Authentication and Autorization
Azure AD groups aren't displayed when using the group federation functionality
Azure AD groups aren't displayed when using the group federation functionality

Learn how to configure Azure AD identity provider to display the user groups when using the group federation functionality.

L
Written by Luciana Pinto Benamor
Updated over a week ago

Follow the steps below to configure the Azure AD and allow the identity provider groups to display on the Digibee Integration Platform when using the group mapping federation functionality.

Azure AD Configuration

1. Click ENTERPRISE APPLICATION on the Azure AD left menu

2. On the search bar, write StagingAzureADSAML

3. Click AZURE AD SAML TOOLKIT

4. Click SINGLE SIGN ON in the manage section of the left menu

5. Click SAML to open the Single Sign On configuration page

IMPORTANT: These data are necessary for basic SAML configuration:

Identifier (Entity ID): https://staging-auth.godigibee.io/samlv2/sp/8595b20a-9874-4d68-81a5-b74ebf8b2
5d
Reply URL (Assertion Consumer Service URL): https://staging-auth.godigibee.io/samlv2/acs
Sign on URL: https://staging-auth.godigibee.io/oauth2/authorize?client_id=33e1842c-4903-47d5-a9ff-8d5857ff78d3&response_type=code&redirect_uri=%2Flogin

6. Click ADD A GROUP CLAIM in the edit section of attributes and claims

7. Select ALL GROUPS on the right menu

8. Click SAVE

Did this answer your question?