Configuring single sign-on (SSO) with new Azure

For partners subscribed to Enterprise plans.

This article explains how to configure the SAML SSO integration of the new Azure AD portal and IT Glue. These instructions apply to the newer Azure portal interface. Learn how to configure SAML SSO for the Azure classic portal in this article.


  • Microsoft Azure account with Azure AD Premium activated.
  • Administrator level access to IT Glue and a Global Admin or Co-admin account in Azure.
  • All of your users under your account in IT Glue will need an account in Azure Active Directory, with exactly the same email address. We don’t create user accounts under SSO.
  • Before you begin, sign in to your IT Glue account twice - once in a regular browser window and once in a incognito/private window. This is to ensure that you are still signed in to your account just in case you get locked out of your account in the other window.


  1. In the Azure portal (, click More services > at the bottom of the main left-hand navigation menu.


  2. Use the Filter field to search for and select Azure Active Directory. (Optional: Star Azure Active Directory to add it to the main left-hand navigation menu.)


  3. From the Azure Active Directory left-hand navigation menu, click Enterprise applications.
  4. With Enterprise applications selected, click + New application at the top of the screen.


  5. Next, click Non-gallery application in the Add your own app section.


  6. Give the new application a name and then click the Add button at the bottom of the screen. This will add a custom application to your Azure Active Directory.

    Note: If you do not have Azure AD Premium activated, you will not be able to enter the name of the application and a corresponding error message will appear.


  7. Once the application loads, select Users and groups in the sidebar menu. At the top of the screen, click + Add user to assign users or user groups to this application.
  8. Next, click Single sign-on from the application’s left-hand navigation menu.


  9. In the sidebar menu, select SAML-based Sign-on in the Single Sign-on Mode dropdown.


  10. Select the Show advanced URL settings checkbox and enter the following URLs in the fields provided (replacing subdomain with your subdomain):
    • Identifier: Enter your IT Glue subdomain, e.g.
    • Reply URL: Enter
    • Sign on URL: Enter
    • Relay State: Skip. It's an optional parameter that is used to tell the application where to redirect the user after authentication is completed.

      Be sure to fill in your IT Glue subdomain where it says subdomain. Note that there's no trailing slash at the end of the URL.


  11. Select user.mail. as the User Identifier.


  12. In the SAML Signing Certificate section, download the Certificate (Base 64) to save the certificate file on your computer. Ensure that you have an active certificate by selecting the Make new certificate active checkbox and/or clicking Create new certificate if necessary.


  13. Enter a notification email for the certificate expiry reminders.
  14. Click the Save button at the top of the screen.
  15. Click Configure <application name> to access the fly-out menu with the other information you need to set up the IT Glue side.
  16. Leave the Azure portal open, and in a different web browser window, sign in to your IT Glue account.

Configuring IT Glue

After setting up Azure, you need to configure your IT Glue account to authenticate using SAML. You will need the certificate and a few pieces of information from Azure to finish the configuration.

  1. Click Account from the top navigation bar.
  2. Click Settings from the sidebar.


  3. Click the Authentication tab.


  4. Use the on/off button to turn on SAML SSO.
    Important. It's highly recommended that before you begin these next instructions, you sign in to your IT Glue account twice - once in a regular browser window and once in a incognito/private window (or just sign in to two separate browsers).
  5. Copy and paste the following information from Azure to IT Glue:
    • Copy the SAML Entity ID and paste it in the IT Glue Issuer URL field.
    • Copy the SAML Single Sign-On Service URL and paste it in the IT Glue SAML Login Endpoint URL field.
    • Copy the Sign-Out URL and paste it in the IT Glue SAML Logout Endpoint URL field.
  6. Go back to the previous page of the Azure settings and copy the Thumbprint and paste it in the IT Glue Fingerprint field.
  7. Open your Base64 encoded certificate downloaded from Azure portal in notepad, copy the content of it into your clipboard, and then paste it in the IT Glue Certificate field.
  8. Finally, click Save to complete the set up of your account.
    Warning. Click Save only when all information has been entered. If you turn on SSO prematurely, it will break the sign-in experience for all users on your account.

Once you make this change, you can test your access.

Testing SSO authentication

Before you configured SSO, you should have created two IT Glue browser sessions. If you get locked out, you will be able to use the incognito/private window to turn off SSO while you investigate the cause.

To make sure SSO is working, perform these steps:

  1. Sign out of and close the Azure management portal and the Azure AD access panel.
  2. In a new browser session, navigate directly to the access panel at
  3. Enter your Azure AD credentials to sign in. After authentication, you will be able to interact with the applications integrated with the directory.
  4. Click on the IT Glue SSO application you created to be redirected and signed in to IT Glue.


Another way to test SSO access is to go to your account subdomain ( directly.

Common Questions

When the SSO server is unavailable, how do we access our accounts?

If the SSO server you specified is unavailable for any reason while you're trying to sign in, authentication will fail. Send us an email for assistance.

How do we disable SSO for a user?

If a member has left your team, and you’d like to disable their user account, an Administrator or Manager will need to delete their account from the Account > Users page in IT Glue. We don't currently support disabling user accounts through the SSO server.

Was this article helpful?
0 out of 0 found this helpful