Skip to main content
Skip table of contents

SAML Setup Steps for Cloud Customers using iGrafx Identity

For Azure AD (Microsoft Entra)

  1. Go to https://portal.azure.com

  2. Search and select Enterprise Application

step1.png
  1. Click New application

step2.png
  1. On the Browser Microsoft Entra Gallery page, click Create your own application

    altstep3.png
  2. Enter a name you want to identify the application with

  3. Select Integrate any other application you don't find in the gallery (Non-gallery)

  4. Click Create

altstep3a.png
  1. In your newly created Enterprise Application, click the Single sign-on blade to open it.

step4.png
  1. On the single sign-on blade, select SAML

step5.png
  1. Click Edit to configure your SAML

step6.png

Basic SAML Configuration by region

For Europe/EMEA

  1. Identifier (Entity ID of the Service Provider): https://id.igrafxcloud.eu/realms/igrafx

  2. The specific Reply URL for your iGrafx Process360 Live will be provided to your by iGrafx
    Reply URL: https://id.igrafxcloud.eu/realms/igrafx/broker/XXX-idp-1/endpoint

  3. Sign on URL: https://YOUR_SUBDOMAIN.igrafxcloud.com

  4. Click Save

image-20240807-222950.png

image-20240807-223522.png

Rest of the World/NA

  1. Identifier (Entity ID of the Service Provider): https://id.igrafxcloud.com/realms/igrafx

  2. The specific Reply URL for your iGrafx Process360 Live will be provided to your by iGrafx
    Reply URL: https://id.igrafxcloud.com/realms/igrafx/broker/XXX-idp-1/endpoint

  3. Sign on URL: https://YOUR_SUBDOMAIN.igrafxcloud.com

  4. Click Save

image-20240807-223208.png

End result should look like this and once this is configured

image-20240807-223457.png

  1. Commonly, your Attributes & Claims section is configured correctly and can be left unchanged.

    image-20240807-223634.png

  2. You can then get the SAML metadata URL that you will need to provide to iGrafx by clicking the copy button in the section below

    2024-08-28_21-08-37.jpg


  3. Finally, configure your groups and users that are allowed to use SSO with the created Enterprise application

step9.png

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.