Microsoft Active Directory
Note for onprem users
Please replace app.aviator.co with with aviator.yourdomain.com in the instructions below.
Azure Active Directory setup
Sign in to Azure portal using one of the following roles: Global Administrator, or Application Administrator.
Go to Azure Active Directory > Manage > Enterprise applications. Click New application.
Select Create your own application.
For name enter Aviator, and select Integrate any other application you don't find in the gallery (Non-gallery). Click Create.
(Optional): Go to properties and update the Aviator logo. Download the original from here.
Log into Aviator and go to SAML configuration page: https://app.aviator.co/saml/okta/configure
Copy the unique Single Sign on url, of format: https://app.aviator.co/saml/sso/<sso-key>
In the Azure portal, after creating the app, go to the app overview and click Single sign-on.
Select SAML.
In the Basic SAML configuration, enter Identifier (Entity ID) as mergequeue.
In the Reply URL, enter the URL you copied on step 6. Click Save.
Under Attributes & Claims, add the following new claims and save. You can leave the other ones as is.
Name: FirstName, Source attribute: user.givenname
Name: LastName, Source attribute: user.surname
Name: Email, Source attribute: user.primaryauthoritativeemail
Copy the App Federation Metadata Url from SAML certificates and paste that in Aviator’s SAML configuration page Metadata url: https://app.aviator.co/saml/okta/configure
Enter the domain that you use for Active Directory, click Save and Activate. Now you should be able to login to the Aviator app using AD from your Application dashboard.
Last updated