Single Sign-On Configuration with Microsoft Azure
To configure Azure with your SolarWinds Service Desk account you will need to access both your Azure Service Portal and SolarWinds Service Desk (SWSD). SolarWinds recommends having them both open at the same time but on separate browser tabs, as you will be going back and forth between the two.
You can choose to use the SSO Configuration video tutorial or the instructions below to guide you through the SSO Configuration process.
- Open your Azure Portal.
- Navigate to Azure Active Directory, and then in the left pane under Manage, click Enterprise applications.
- Click the New application tab, and under Application type, search for
- Click SolarWinds Service Desk.
A new pane will open on the right.
- At the bottom of the new pane, click Create.
Azure will add SolarWinds Service Desk and open it.
Step 2 - Change the User Assignment Requirement
- In SolarWinds Service Desk (SWSD) within Azure, under Manage in the left pane, click Properties.
- Scroll down to User assignment required? and switch the toggle to No.
This allows anyone within your Active Directory to authenticate through single sign-on with Azure.
- Scroll to top and click Save.
In Azure, under Manage on the left pane, click Single sign-on.
- Click SAML.
- In the first section, Basic SAML Configuration, click Edit.
- Enter the requested information:
- Identifier (Entity ID):
At a minimum, two Reply URLs are required, as shown below.
In addition, you will need your [ACCOUNTNAME], which can be found in SWSD under Setup > Account > Account Summary. Your account name comes from the first part of your Account URL. For example, if the Account URL were samanagemarketing.samanage.com, your account name would be
Here are the Reply URLs you will need:
If you are using the Domain Mapping feature in SWSD you will need a third Reply URL, replacing your Account Name with the custom domain you are using in SWSD. For example:
- Identifier (Entity ID):
Sign on URL: https://[ACCOUNTNAME].samanage.com/saml/[ACCOUNTNAME]
Get from SWSD (Account > Single Sign-On > Azure AD), and then copy the Login URL.
Step 4 - Verify Attributes & Claims Accuracy
If you plan to use both SSO and Single Sign-On Configuration with Microsoft Azure , in Azure go to the second section labeled Attributes & Claims, and then click Edit.
In Attributes & Claims, verify that the two different Active Directory fields below contain the same information.
Unique Principal Name - see Required claim > Claim name > Edit > Unique User Identifier (Name ID)
User Email Address - see Additional claims > Claim name
If the two do not match exactly, SolarWinds suggests you contact Technical Support for assistance.
In Azure, go to the third section, labeled SAML Signing Certificate.
If you are using Domain Mapping, add a reply URL using your custom domain. For example:
If you are configuring SSO prior to completion of User Provisioning with Microsoft Azure , disable User Assignment Required within the Properties menu in SWSD.
Step 6 - Set up Login URL and Certificate
In Azure, go to the fourth section, labeled Set up SolarWinds Service Desk.
Next to Login URL, click the Copy to Clipboard button.
Go to SWSD > Account > Single Sign-On.
In the Login URL field, paste the contents of the Clipboard.
Scroll down to the Azure Identifier field and type in
solarwinds.com.The contents of this field must exactly match the information in the Azure Identifier (Entity ID): Solarwinds.com field.
In a text editor, open the downloaded Certificate file.
Copy the entire contents of the Certificate file.
Return to SWSD, scroll down to the text field labeled Paste your Identity Provider x.509 Certificate below, and paste the contents of your Clipboard.
Under the text field:
- Add a check mark next to Create users if they do not exist.
- Remove the check mark next to Redirect to the saml login page when logging into SolarWinds Service Desk by default.
During initial configuration and testing, Solarwinds recommends leaving the second check box above unmarked.
Step 7 - Test Single Sign-On
Open an incognito tab (or private browsing session) in an Internet browser.
Enter your account URL, and then test login.
After a successful test, return to SWSD, and add check marks to both boxes under the text field.
If the test works for one individual in your domain it will work for all.
Create users if they do not exist.
Redirect to the saml login page when logging in by default.
Your single sign-on configuration is complete.
If you receive an error after testing, contact Technical Support for assistance.
Some customers choose to provision users with Microsoft Azure Active Directory. (See User Provisioning with Microsoft Azure for instructions.)