# Azure ADFS Identity Provider

### Create Azure AD Enterprise Application

{% hint style="info" %}
**Note:** Make sure that the Azure domain is an exact match to the e-mail domain used to register a tenant in IT-Conductor. Users with mismatched email domains will not be able to auto-provision in IT-Conductor
{% endhint %}

In the Azure Portal, navigate to **Azure Active Directory → Enterprise Applications → New Application.**

Don't try to locate an existing one but click **+ Create your application**.

<figure><img src="https://377464071-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FXhp08OmU8050PePmMgDt%2Fuploads%2FKgGZ6vIbc2Bbhq0oMEv4%2Fazure-create-app.png?alt=media&#x26;token=25b19d71-5d5b-43f7-89f4-da0c05e5983f" alt=""><figcaption><p>Figure 1: Create Your Own Application Wizard</p></figcaption></figure>

<figure><img src="https://377464071-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FXhp08OmU8050PePmMgDt%2Fuploads%2Fdq03xCyjHfBxRG5GEG3L%2Fazure-app-setup.png?alt=media&#x26;token=a2ecd0e3-1f19-467f-8d55-a229989249a3" alt=""><figcaption><p>Figure 2: Application Setup</p></figcaption></figure>

1. Assign users and groups&#x20;
2. Click **Get Started** in "Set up single sign on".

<figure><img src="https://377464071-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FXhp08OmU8050PePmMgDt%2Fuploads%2F5r3sZYlKp12VVnMxB4ev%2Fazure-app-sso-setup.png?alt=media&#x26;token=5fbc2333-4fe9-4f49-b41d-d476f970e168" alt=""><figcaption><p>Figure 3: IT-Conductor SSO Configuration</p></figcaption></figure>

Click on **SAML** to configure.

<figure><img src="https://377464071-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FXhp08OmU8050PePmMgDt%2Fuploads%2F48qSKEA61BYCZcv87gG0%2Fazure-app-saml-setup.png?alt=media&#x26;token=a5303787-58f5-48c2-80d6-8929248ce81b" alt=""><figcaption><p>Figure 4: SAML Configuration</p></figcaption></figure>

Fill in the fields as described on the [SSO Setup](https://docs.itconductor.com/user-guide/setup/sso-setup):

<figure><img src="https://377464071-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FXhp08OmU8050PePmMgDt%2Fuploads%2F9J6pbEtAfrhtyTe5oKpX%2Fazure-app-saml-save.png?alt=media&#x26;token=3afa5a7b-a1ed-4152-be51-6a62a2a8deec" alt=""><figcaption><p>Figure 5: SAML Configuration with actual values</p></figcaption></figure>

Click **Federation Metadata XML Download** to export the metadata to a file.

Import the metadata into IT-Conductor to create an Identity Provider definition as described in [SSO Setup](https://docs.itconductor.com/user-guide/setup/sso-setup).

Click **Test** to validate SSO Configuration.
