Entra ID (Azure AD) using SAML2
Last Updated 28 days ago
In order to work around the limitation of the Entra ID native integration where a user will get the same Quickchannel User Role on all the connected Quickchannel accounts you can instead use SAML2 to connect against Entra ID.
This is only relevant for customers having or planning to have multiple Quickchannel accounts. Configuring the SAML2 integration is more involved.
- In your Microsoft Entra admin center navigate to Identity -> Applications -> Enterprise Applications and click New Application.
- Choose a name, for example Quickchannel SAML2, and Non-gallery application. Click Create.
- Navigate to Manage -> Single sign-on and choose SAML.
- Under SAML Certificates copy the value for App Federation Metadata Url.
- Log in to Quickchannel Account Console and navigate to Settings -> Integrations -> Single Sign-on and click Connect SAML2 IdP.
- Fill in a name, the metadata URL from step 4, the email domain of you and your users (for example quickchannel.com) and the following attribute mapping:
Email http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
UUID http://schemas.xmlsoap.org/ws/2005/05/identity/claims/objectidentifier
Name http://schemas.xmlsoap.org/ws/2005/05/identity/claims/displayname
Role http://schemas.microsoft.com/ws/2008/06/identity/claims/role
Click Save.
Note that there is a security restriction requiring you to have logged in using this email domain. - Download the linked SP Metadata file.
- In the Entra admin center, on the Single sign-on page from step 4, click Upload metadata file from step 7.
- Click Users and groups under Manage och click the link application registration to navigate to App roles configuration. Add app roles with values of the form accountid:role.
The account id can be found in Quickchannel Account Console under Settings -> API.
The following role values can be used: administrator, publisher, user, producer, readonly.
When you are finished it could look similar to this: - Navigate back to your Enterprise Application and under Manage -> Users and groups you can assign the app roles as appropriate: