Previous page

Next page

Locate page in Contents

Configure the Azure Application for Parallels RAS

To configure the Azure application to work with Parallels RAS, do the following:

  1. In Azure Portal, click on the SAML application tile and switch to the Single Sign-on pane > SAML .

    Azure-IdP-004.png

  2. In section (3) SAML Signing Certificate , copy the App Federation Metadata Url value.

    Note: For manual configuration, you can download Certificate (Base64) and Federation Metadata XML by clicking the corresponding Download links.

    Azure-IdP-005.png

  3. Open the Parallels RAS Console, navigate to Connection > SAML and click Tasks > Add .
  4. In the Add Identity Provider wizard, import metadata from a file or specify its URL and choose an HTML5 Theme to associate the IdP with.

    Azure-IdP-006.png

  5. Click Next .
  6. On the next page of the wizard, the IdP certificate and Logon / Logout URL fields will be automatically populated. Verify that everything is correct and click Finish .

    Important: The Allow unencrypted assertion option must be cleared in case you did not configure assertion encryption in Azure.

    Azure-IdP-007.png

  7. Back in the RAS Console, right-click on the IdP provider you just created and choose Properties .
  8. In the dialog that opens, select the SP tab. Take a note of the information displayed here.

    Azure-IdP-008.png

  9. Switch back to the SAML application in Azure Portal. Specify the values in section (1) Basic SAML Configuration according to the values in the SP tab in the RAS Console (see above).

    Azure-IdP-009.png

  10. Next required step is to configure attributes to match IdP users with AD users. In this example, the custom attribute is used with the following setup:
    • In Azure Portal > SAML app > Single Sign-On , open section (2) User Attributes & Claims .
    • From the Claim name list, copy the name of the user.userprincipalname value:

    Azure-IdP-010.png

  11. Back in the RAS Console, in the Add Identity Provider dialog, select the Attributes tab, enable the Custom attribute and set its value to be the claim name you copied in the previous step.

    Azure-IdP-011.png

You may also use Azure AD Connect to match users via "Immutable ID". To do so, in Active Directory, create an attribute using the following values:

  • Name: ImmutableID
  • Source: attribute
  • Source attribute: user.onpremisesecurityidentifier

Further information available at docs.microsoft.com