Microsoft Entra ID
Enable your users to sign in into Langdock using their Entra ID (formerly Azure Active Directory) accounts via SAML.
You can also reach out to support@langdock.com to set up your SSO integration with assistance.
Prerequisites
- A Langdock workspace on the Enterprise plan.
- Access to an admin account in your Langdock workspace.
- An Entra ID account with the ability to create and manage Enterprise applications.
- ”Join by domain” must be enabled in your Langdock security settings.
Create a new Enterprise application in Entra ID
First, you need to create a new Enterprise application in your Entra ID portal.
To do this, follow these steps:
-
In your Entra ID portal navigate to the Overview page and add a new Enterprise application under ”+ Add” -> “Enterprise application”.
-
Create a new custom application by clicking on ”+ Create your own application”.
-
Name your application (e.g. “Langdock”)
-
Select the option “Integrate any other application you don’t find in the gallery (Non-gallery)“
SAML Configuration
After creating the application, you need to configure the SAML settings, which will allow Langdock to authenticate users via SAML.
First, navigate to the “Single sign-on” settings of your newly created application, by selecting “Set up single sign on” and choosing “SAML” as the single sign-on method.
Next, you need to get the SAML metadata from Langdock, which you can find in your Security settings, after activating the “SAML Active” toggle.
Here, you need to copy two values from the SAML metadata:
- The “Audience URI (SP Entity ID)” value (
langdock.com
) - The “Assertion Consumer Service (ACS) URL” value
Now, you can configure the SAML settings in your Entra ID portal, by first clicking “Edit” in the “Basic SAML Configuration” section, and then filling in the following values:
- “Identifier (Entity ID)”: The “Audience URI (SP Entity ID)” value from Langdock
- ”Reply URL (Assertion Consumer Service URL)”: The “Assertion Consumer Service (ACS) URL” value from Langdock
- ”Sign on URL”: The “Assertion Consumer Service (ACS) URL” value from Langdock
You can leave the other fields empty or with their default values. Finally, save the configuration by clicking “Save”.
You also need to modify the default SAML Certificate configuration, by clicking “Edit” in the “SAML Certificates” > “Token signing certificate” section and:
- Setting the “Signing Option” to “Sign SAML response and assertion”
- Setting the “Signing Algorithm” to “SHA-256”
Finally, save the SAML Certificate configuration by clicking “Save”.
To finalize the SAML setup, you need to copy the Login URL and the SAML Signing certificate from Entra ID to Langdock.
- In the “SAML Signing Certificate” section of your Entra ID portal, click on “Download” next to “Certificate (Base64)” link to download the certificate. You have to open the certificate in a text editor and copy the content. This will be in the format of:
- Copy the “Login URL” value from the “Set up Langdock” section in your Entra ID portal.
In your Langdock workspace, navigate to the Security settings again and paste the copied values into the respective fields:
- Fill in the “Issuer” field with the Audience URI specified earlier (
langdock.com
). - Paste the “Login URL” value from Entra ID into the “Sign on URL” field.
- Paste the SAML Signing certificate content into the “Certificate” field.
Test the SAML setup
To test the SAML setup, open seperate browser or an incognito window and navigate to https://app.langdock.com.
Enter an email address of a user in your Entra ID account and click “Continue”.
You will be redirected to the Entra ID login page, where you can enter your credentials.
After successful authentication, you will be redirected back to Langdock and logged in.
Troubleshooting
If you encounter any issues during the setup, please reach out to support@langdock.com for assistance.
Was this page helpful?