Setting up Azure AD for Firmex SSO

Have more questions? Submit a request

Step 1 - Create an application

Note: You may add the Firmex VDR app from the Azure Marketplace. 

  1. Log in to Azure as an administrator using this URL (
  2. From the left pane, select Azure Active Directory.
  3. Under Manage, select Enterprise applications.
  4. Click New Application.
  5. Select Add from the gallery and in the search box type Firmex VDR.
  6. Select Firmex VDR from results panel and then add the app. Wait a few seconds while the app is added to your tenant.

Step 2 - Set up SSO

  1. Under Manage, select Single Sign-On.
  2. Select SAML.
  3. Click the pencil icon to edit the Basic SAML Configuration.
    Note: This information may already be pre-populated
  4. Enter Identifier (Entity ID) and Reply URL (Assertion Consumer Service URL). Then click Save.
    Note: Azure uses Identifier as an Audience, which is
    Note: ACS URL below


Next, click the pencil icon to edit User Attributes & Claims

  1. Change EmailAddress value to Email by clicking on the field and modifying the value and click Save.
  2. Download Federation Metadata XML and copy the X509Certificate value.
    Note: The X509Certificate value is embedded in the XML file. Use an XML editor, or Notepad, to open the XML file, and then look for the <X509Certificate> tags. Copy the value between the tags. saml-signing-certificate.png
  3. Copy the values from Login URL and Azure AD Identifier, as both of them will be used to configure SAML on Firmex side.

Step 3 - Adding users to the application

In order to access the Firmex application, you will need to grant access to the application to each user. You can create a new user for an environment, or add the application to an existing user’s profile.

  1. Under Manage click Users and Groups
  2. Click Add user or group
  3. Select the user that you want to add and click Save.

Proceed to configure the Firmex side and note the following Azure-specific terms when referring to the Firmex Configuration Guide:

  • Entity ID = Azure AD Identifier
  • Identity Provider URL = Login URL
  • Federation Metadata XML > X509Certificate value = Public Key Certificate

Articles in this section

Was this article helpful?
0 out of 0 found this helpful