The steps in this topic describe how to configure a custom SAML application in Azure AD.
Before you set up a custom SAML application in Azure Active Directory (AD), you must configure SSO in Postman. Select “AD FS” as the “Authentication Type” and allow “Identity Provider Details” to remain empty for now.
Next, sign in to the Azure management portal using your Azure Active Directory administrator account.
Browse to the Azure Active Directory > [Directory] > Enterprise Applications, and select “New Application”.
Select “Non-gallery application”.
Enter the name of the application and click “Add”.
Assign a test user to the application. (Required)
In the “Configure Single Sign-on” section, select “SAML-based Sign-on” in the “Single Sign-on Mode” dropdown.
Configure the SAML integration. The table below describes the values of the fields in this configuration.
Table: Field description for SAML integration
|Identifier||The Entity ID for your Postman custom SSO auth. You can find it in the Team page.|
|Reply URL||The ACS URL for your Postman custom SSO auth. You can find it in the Team page.|
|User Identifier||Select user.mail from the dropdown|
Download the “SAML Signing Certificate” (Base64 format) and click the Save button.
After the setup is complete, submit your Identity Provider details to Postman. For more information, see Intro to SSO The table below describes the values of the fields in this configuration.
Table: Field description for SAML Signing Certificate
|Identity Provider Issuer||The SAML Entity ID of your Azure AD application.|
|Identity Provider SSO URL||The SAML Single Sign-on Service URL of your Azure AD application.|
|X.509 Certificate||Contents of the SAML Signing Certificate file.|