Configuring SSO in Microsoft Azure Active Directory
Enterprise Plans only
Log into Azure administrator panel and go to Active Directory.
In the menu click Enterprise Applications.
Click New Application.
Type Sauce Labs in the search box and choose the app Sauce Labs.
Leave the default name or rename it and click Create.
Set up SAML Single Sign-On either by clicking Single sign-on in the menu on the left or by clicking the tile Set up single sign on.
Click the SAML tile.
Save the default configuration by clicking Yes.
In the Attributes & Claims section click Edit.
Edit the value of NameID by clicking on it.
Make sure that the source value of this claim is a valid email address (for example
user.mail
) and not a user identifier. Sauce Labs Service Provider requires valid email addresses during SAML SSO authentication. If you changed the source attribute, save the changes.Next, assign users to this application:
Go to User and groups in the main menu of the application.
Click Add user/group.
Choose which groups and users should have access to Sauce Labs via this SAML application.
Go back to the Single sign-on tab.
In the SAML Certificates section for Federation Metadata XML, click Download.
Use the metadata file from the previous step and set up the SSO integration at Sauce Labs in Team Management Panel.
Test the integration using the IdP-initiated and the SP-initiated login.
The IdP-initiated flow can be tested from the Single sign-on tab.
Next, in the last section Test single sign-on with Sauce Labs click Test.
Click Test sign in.