Azure AD (Active Directory)

Learn to configure Azure AD SSO with BigPanda.

Azure AD (Active Directory) Sign-On automatically signs users in when they are on their corporate devices connected to your corporate network. When enabled, users don't need to type in their passwords to sign in to Azure AD, and usually, even type in their usernames. This feature provides your users easy access to BigPanda without needing any additional on-premises components.

Use the instructions on this page to configure the Azure AD solution in BigPanda.

Add BigPanda to Azure AD

  1. Within the Azure AD Gallery, click + Create Your Own Application.
  2. Populate the following fields with the indicated values:
    1. What is the name of your app? - type BigPanda SSO
    2. What are you looking to do with your application? - select Integrate any other application you don’t find in the gallery (Non-gallery)
    3. Identifier (Entity ID) - https://bigpanda.io/SAML2
    4. Reply URL (ACS URL) - https://api.bigpanda.io/logic/<ORG_NAME>/pingone/callback
  3. Click Save.
  4. Copy the login URL. This is the SAML 2.0 Endpoint value in the BigPanda SSO configuration.
  5. Download the Federation Metadata XML and open the file.
  6. Copy the value in between the tags. This is the x509 certificate value in the BigPanda SSO configuration.

Add Azure AD to BigPanda

  1. Within BigPanda, navigate to Settings > Single Sign-On.
  2. Select the PingOne icon.
  3. Under Configure PingOne Information in BigPanda, populate the following fields with the information copied from Azure:
    1. Issuer ID - https://bigpanda.io/SAML2
    2. SAML 2.0 Endpoint (HTTP) - The login URL copied from Azure AD.
    3. X.509 Certificate - The certificate copied from the Federation Metadata XML file.
  4. Click Configure PingOne to save.