Prerequisites
- Administrator access to your Azure AD tenant
- SnackBase installed and running
Step 1: Create an Enterprise Application
- Log in to the Azure Portal
- Navigate to Microsoft Entra ID > Enterprise applications
- Click New application
- Click Create your own application
- Enter a name (e.g., “SnackBase”) and select Integrate any other application you don’t find in the gallery (Non-gallery)
- Click Create
Step 2: Set up Single Sign-On
- In your new application, go to Single sign-on in the left menu
- Select SAML
Step 3: Configure Basic SAML Configuration
Click Edit on the Basic SAML Configuration card.- Identifier (Entity ID): Enter a unique identifier for SnackBase
- Format:
https://<your-domain>(must matchsp_entity_idin SnackBase)
- Format:
- Reply URL (Assertion Consumer Service URL): Enter your SnackBase ACS URL
- Format:
https://<your-domain>/api/v1/auth/saml/acs
- Format:
- Click Save
Step 4: Configure Attributes & Claims
Click Edit on the Attributes & Claims card. Ensure the following claims are present (Azure AD usually adds them by default):emailaddressorname(user principal name) for emailgivennameandsurnamefor name mapping
Step 5: Configure SnackBase
- On the SAML-based Sign-on page, scroll down to SAML Certificates
- Download Certificate (Base64), open it in a text editor to copy the content
- Scroll down to the Set up section
- In SnackBase, create a new SAML provider configuration with the following values:
| SnackBase Field | Azure AD Value |
|---|---|
idp_entity_id | Azure AD Identifier |
idp_sso_url | Login URL |
idp_x509_cert | Content of the Certificate (Base64) file |
sp_entity_id | The Identifier (Entity ID) you set in Step 3 |
assertion_consumer_url | The Reply URL you set in Step 3 |
Testing
- Save your configuration in SnackBase
- Assign a user to the application in Azure AD (Users and groups > Add user/group)
- Attempt to sign in via the SAML SSO button
Troubleshooting
Microsoft Azure Active Directory has been renamed to “Microsoft Entra ID”. The functionality remains the same.
- AADSTS50105: The user is not assigned to the application. Assign the user or group in Azure AD
- Invalid certificate: Ensure you’ve copied the entire certificate content including BEGIN and END markers
- Entity ID mismatch: Verify the
sp_entity_idin SnackBase matches the Identifier in Azure AD exactly