Skip to main content

Create the Azure AS SSO Application

note

The following screenshots and process was correct and valid as of the last update to this documentation (21/11/2024). Microsoft does like to rename and move things around so if something is wrong please let us know via the support options.

This will be a SP (Service Provider) initiated flow, so users will still have to authenticate via the Focus website. idP initiated is not supported, but if your Organization requires this, please reach out for a work around.

Entra application setup​

  1. Open the Azure portal and sign in as an administrator
  2. Search or select Microsoft Entra ID service from the search on left hand menu

Select Entra Id

  1. Navigate to the Enterprise applications section within the Manage menu.

Select Enterprise apps

  1. Click New application

Select New app

  1. And select Create your own application.

Select Create my own apps

  1. Enter the application name. E.g. Subphonic-Focus-SSO
  2. select Integrate any other application you don't find in the gallery (Non-gallery) from the application options
  3. Press Create

Select Create my own apps

  1. Select Setup single sign-on

Select Create my own apps

  1. From the next menu, Select SAML

Select Create my own apps

  1. On the next screen you will be asked for two bits of information:
    1. click the 'Edit' button and complete the required fields.
    2. The URLs needed in this section will be provided to you by the Subphonic support team upon request. Under each section you will need to press theadd button to complete both the Identifier (Entity ID) and Reply URL (Assertion Consumer Service URL) sections.
    3. Press Save at the top of the section

Select Create my own apps

  • Identifier: The Identifier or Entity ID represents a globally unique identifier for your Focus service, functioning as the EntityId for SP during authentication requests to the IdP. This identifier is pivotal for the secure exchange of SAML assertions and other authentication-related data between the IdP and Focus.
  • Reply URL: The Assertion Consumer Service (ACS) URL is the location where the SAML assertion is sent with a POST request. This URL is used by the IdP to send the SAML assertion to Focus. It acts as a callback URL where Focus expects to receive and consume the SAML response containing the user's identity information.

Perfect, the application is now setup πŸ‘

Data to be provided to Subphonic​

Almost done, however to make the SAML SSO integration work, you will need to provide the IdP metadata back to the Focus support team. The required data is all within the same Enterprise Application -> Single sign-on settings page.

Focus provides three different ways to configure the IdP metadata. The easiest way is by providing the metadata URL of the Azure AD SSO application.

  1. Copy the App Federation Metadata Url from section 3 of your Azure AD SSO application's SAML Certificates section and send to the Focus support team

Copy metadata url

tip

If you are not able to supply the Metadata URL (preferred method), Focus also supports an upload of the XML file (simply send this to the support team) or adding the data manually, if you need to go down this route, we will require the Sign on URL, Issuer url and the Certificate please contact support if you need more help.

  1. You will also need to provide the email domain used for auth e.g. @mycompany.com

Configure user attributes mapping​

Focus provides a flexible way to map the user attributes returned from IdP to the user attributes in Focus. Focus will sync the following user attributes from IdP by default:

  • id: The unique identifier of the user. Focus will read the nameID claim from the SAML response as the user SSO identity id
  • email: The email address of the user. Focus will read the email claim from the SAML response as the user primary email. This is mapped to: emailaddress
  • name: The name of the user. This is mapped to: user.displayname
note

If you wish to change or add any mappings please contact support

Configure user roles​

When a user logs in via SSO, Focus reads their role from the standard Microsoft Entra ID role claim:

http://schemas.microsoft.com/ws/2008/06/identity/claims/role
  • If a role claim is sent, the user's Focus role is set to match the claim value on every login.
  • If no role claim is sent, new users are created as a Standard User and existing users keep their current Focus role.

To send a role claim, you need to define App Roles on the application in Azure and then pick the appropriate role for each user when you assign them in the next section.

tip

Configuring roles is recommended for any SSO setup β€” it lets you manage Focus permissions directly from Azure rather than editing each user inside Focus.

Define App Roles​

  1. In the Azure portal, navigate to your Enterprise Application (the one created for Focus SSO).
  2. Go to App registrations and find the corresponding app registration.
  3. Select App roles from the left menu.
  4. Create one app role for each Focus role you intend to use, using the exact values from the table below as the role's Value.

Allowed Role Values​

Role Claim ValueDescription
SuperUserFull account admin
AdminUserUser and account management
ComplianceUserRead-focused access, reporting and downloads
SupervisorTeam oversight
TeamLeaderUser management plus standard user access
GeneralUserStandard user
BasicUserSame as GeneralUser
PlaylistUserPlaylist access only
Role claim values are case-sensitive

Make sure the role value configured in Azure matches exactly as shown in the table above (e.g. SuperUser not superuser).

tip

You only need to configure the roles you intend to use β€” not every role is required.

Assign users to the Azure AD SSO application​

Only users assigned to your Azure AD SSO application will be able to authenticate through the Focus Azure AD SSO connector. To assign a user or groups of users to the application follow the steps below:

  1. From within the same Enterprise Application -> Single sign-on settings page, select Users and groups
  2. Then Add user/group at the top of the page

Copy metadata url

  1. Select the text None Selected and a search menu will open
  2. Search for any users or groups you wish to authorize for access to the application
  3. Tick the required users or groups
  4. The users being added will show on the far right menu

Copy metadata url

  1. Once you are happy with the selected users and groups, press Select at the bottom
  2. If you defined App Roles in the previous section, select the appropriate Focus role for each user or group
  3. You will get a confirmation screen with how many users are being added
  4. If happy, press Assign

Copy metadata url

πŸŽ‰πŸŽ‰ Congratulations, your authorized users should now be able to login to the Focus portal.πŸŽ‰πŸŽ‰

Optional: Pre-provision users with the Entra Sync app​

By default, users are created in Focus the first time they log in via SSO (just-in-time provisioning). If you'd like users to appear in Focus before their first login β€” so you can assign them to groups, configure settings, or have them visible in the admin screens ahead of time β€” you can enable the Entra Sync app.

The Entra Sync app only pre-loads users β€” role assignment still happens via the SAML role claim configured above on every login.

For setup instructions, see the Pre-provisioning users with Entra Sync guide.

Troubleshooting Common Issues​

If you encounter issues during the setup or login process, here are some common problems and their solutions:

  • Users cannot log in: Verify that the users are assigned to the Azure AD SSO application. Check the "Users and groups" section to ensure the correct users or groups are added.
  • Metadata URL not working: Ensure the Metadata URL is correctly copied and accessible. Test the URL in a browser to confirm it returns the expected XML.
  • SAML response errors: Use browser developer tools to inspect the SAML response. Verify that the Identifier and Reply URL match the values provided by Subphonic.
  • Attribute mapping issues: Confirm that the attributes returned by the IdP match the expected mappings (e.g., emailaddress, user.displayname). Contact support if custom mappings are needed.
  • Missing or incorrect permissions: If no role claim is configured, new users provisioned via SSO will be set up as a Standard User. To automate role assignment, see the Configure user roles section above.

Security Best Practices​

  • Always share the Metadata URL or XML file securely. Avoid using insecure channels like unencrypted email.
  • Regularly review and update the list of authorized users and groups to ensure only necessary access is granted.

Testing the SSO Setup​

Before rolling out the SSO setup to all users, test it with a small group of users to ensure everything works as expected. Use the following steps:

  1. Assign a test user to the Azure AD SSO application.
  2. Attempt to log in to the Focus portal using the test user's credentials.
  3. Verify that the user attributes (e.g., email, name) are correctly synced.

If any issues arise during testing, refer to the troubleshooting section or contact support for assistance.

Docs AssistantAsk anything about our products