Configuring SAML SSO Between Mailsac and Microsoft Azure Active Directory
Before we start, ensure that you have admin rights on both Mailsac and Azure AD.
Configuring Azure AD
Sign in to the Azure portal.
Search for and select “Azure Active Directory”.
From the left-hand menu, choose “Enterprise applications”.
Select “Enterprise Applications” from the left-hand menu.
Click “New application”.
Click “New application”.
In the section page titled “Browse Azure AD Gallery” select “Create your own application”.
Select “Create your own application”.
In the “Add your own app” section, click on “Non-gallery application”. Enter a name for the application (for example, “Mailsac SSO”) and click “Create”.
Click “Non-gallery application”.
On the left-hand menu of your new application, click “Single sign-on”. From the single sign-on method page, click “SAML”.
Click “Single sign-on” then “SAML”.
The “Set up Single Sign-On with SAML” page appears. In the “Basic SAML Configuration” section, click “Edit” to open the settings. You’ll need to add Mailsac’s Entity ID (Identifier) and Reply URL (Assert URL), which are available on the Mailsac SAML page.
Click “Edit” in the “Basic SAML Configuration” section then add the Entity ID and Reply URL.
In the “User Attributes & Claims” section, you will need to send the Unique User Identifier (Name ID) to Mailsac. The default for this should be acceptable.
Click “Edit” in the “User Attributes & Claims” section then add the Unique User Identifier (Name ID).
In the “SAML Certificate” section, download the SAML Certificate (Base64). We’ll need this when configuring the Mailsac side of things.
Click “Download” in the “SAML Certificate” section.
In the “Set up mailsac sso” section, copy the “Login URL” and “Azure AD Identifier” values. We’ll need these when configuring the Mailsac side of things.
Copy the “Login URL” and “Azure AD Identifier” values.
In the “Users and Groups” item in the sidebar, you can add users and groups that will be able to sign in to Mailsac using Azure AD.
Click “Users and Groups” in the sidebar.
Configuring Mailsac
Sign in to Mailsac.
Navigate to the Mailsac SAML page.
Copy and paste the SAML Certificate (Base64), that you downloaded from Azure AD, into the “Identity Provider Certs” field.
Paste the SAML Certificate (Base64) into the “Identity Provider Certs” field.
Set “Name ID Format” to “urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress”.
Set “Name ID Format” to “urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress”.
In the “Identity Provider Settings”, paste the “Entity ID” and “Login URL” from Azure AD.
Paste the “Entity ID” and “Login URL” from Azure AD into the “Identity Provider Settings” section.
The final step is to add a sub-account user to Mailsac. Open the API Keys and Users page and click “Manage Users”. Add a user with the same name as their Azure AD email address.
Click “Manage Users” and add a sub-account with the same name as their Azure AD email address.
Now, Mailsac and Azure AD should be set up for SAML SSO. Users will be able to sign in to Mailsac using their Azure AD credentials.