Azure Active Directory
Azure Active Directory (Azure AD) is Microsoft’s cloud-based identity and access management service, which helps your employee’s sign in and access resources. You can use Azure AD to control access to your apps and your app resources, based on your business requirements.
Upon setup, you will be asked to provide a Sign-On URL and an Assertion Consumer Service (ACS) URL.
For the subdomain, use the coordinating subdomain listed in your Braze instance URL. For example, if your instance is
|Assertion Consumer Service (ACS) URL||
For some IdPs, this can also be referred to as the Reply URL, Audience URL, or Audience URI.
Service Provider (SP) Initiated Login within Azure AD
Step 1: Add Braze from the Gallery
- Go to the Azure Portal and click
Azure Active Directoryin the left navigation panel.
- Navigate to
Enterprise Applications, then select
- Add a new application by clicking
+ New applicationin the top of the dialog.
- Search for
Brazein the search box, then select it from the result panel, then click
Step 2: Configure Azure AD Single Sign-On
- In your
Azure Portal, go to the Braze Application Integration page and select
SAML/WS-Fedas your method from the
Single Sign-On methoddialog to open the
Set up Single Sign-On with SAMLpage.
- From there, click the
Editicon to open the
Basic SAML Configurationdialog.
- If you wish to configure the application in IDP initiated mode, enter a URL that combines your Braze instance with the following pattern:
- If you wish to configure the application in SP initiated mode, click
Set additional URLsand enter a URL that combines your Braze instance with the following pattern:
- Braze expects the SAML assertions in a specific format. You can manage the values of these attributes from the User Attributes section on the
Application Integrationpage. On the
Set up Single Sign-On with SAMLpage, click
Editto open the
User Attributesdialog. Then, edit the claims according to the proper format, shown below.
- Go to the
Set up Single Sign-On with SAMLpage, then scroll to the
SAML Signing Certificatesection and download the appropriate
Certificate (Base64)based on your requirements.
- Go to the
Set up Brazesection and copy the appropriate URLs for use in the Braze configuration.
Step 3: Configure Azure AD within Braze
Once you have setup Braze within your Azure AD, they will provide a Target URL (Login URL) and
x.509 certificate which you will input into your Braze account.
After your Account Manager has enabled SAML SSO for your account, go to
Company Settings >
Security Settings and toggle the SAML SSO section to
On this page, you, input:
||This will appear as the button text on the login screen. This is typically your IdP name, like “Azure AD.”|
||This is the Login URL provided by Azure AD.|
Create and Enable a Braze API Key for IdP Login (Optional)
To enable IdP initiated login, you will first need to create an API Key in
Developer Console >
Input the generated API Key as the
RelayState parameter within Azure AD, which will be used to identity which company the user is trying to log into.
If you want your Braze account users to only sign in with SAML SSO, you can restrict single sign-on authentication from the
Company Settings page.