Important: This Knowledge Article only aims to provide basic guidelines for configuring the Anypoint Platform as a Service Provider in Microsoft Entra ID (formerly known as Azure AD). The contents of the article are to be used at your own risk and are provided as-is. For further information on configuring Microsoft Entra ID, please reach out to Microsoft Support.
Before starting: Bear in mind that the Relying Party Trust will need to be created manually as we do not provide a metadata file (nor is its use supported).
Step 1: Open the Microsoft Entra admin center (entra.microsoft.com) and navigate to Microsoft Entra ID (formerly known as Azure Active Directory).
Step 2: Navigate to Applications > Enterprise applications. Click on All Applications and select + New Application.
Step 3: From the add application screen, select "Create your own application", then choose "Integrate any other application you don't find in the gallery (Non-gallery)" and give it an identifying name.
Step 4: Click on your newly created Enterprise application and head over to Single Sign On.
Step 5: Complete the following settings.
Step 6: In the SAML Signing Certificate section, click Edit, then click New Certificate to create a new signing certificate. Once created, set its status to Active.
Once the certificate becomes active, you need to download it in Base64 format.
Step 7: Add users to your application.
Click on your newly created Enterprise application and head over to "Users and Group". Add a user
Step 8: Gathering the information to set up the Anypoint Platform.
When you download the metadata xml post setup that can be shared with MuleSoft Support. This has all the values required to do setup at their end. Or you can manually grab all the values as below.
Expand the configuration instructions for Anypoint Platform on the Azure AD Portal. Out of these we'll take note of the SAML Entity ID and the Sign-Out URL.
Go back to the Enterprise Application properties and take note of the User access URL:
Capture the payload of the SAML POST by attempting to authenticate from the User access URL to the Anypoint Platform.
Documentation: https://docs.mulesoft.com/access-management/conf-saml-sso
Complete the required following fields on the Platform. You can use the SAML XML you captured previously or Metadata provided by customers IDP:
https://myapps.microsoft.com/signin/[ApplicationName]/[ID] (if this is the URL then IDP initiated should be set to true on Anypoint)
https://login.microsoftonline.com/common/wsfederation?wa=wsignout1.0
Expand Advanced Settings, and fill out the following fields (check the XML SAML Assertion previously captured for the exact names of the mappings):
Save the changes and try to sign on from the Identity Provider, by navigating to > your new Enterprise application > Single Sign On > click the "Test this application"
or
Save the changes and try to sign on from the Identity Provider, by using the SSO URL as per the instructions in the documentation To Test External Identity.
When the setup is complete and users can login, you will need to configure the user permissions. You can assign permissions manually to the user after they login, or map Anypoint Platform Teams (recommended) or Roles (legacy option) to IdP groups via the "External IdP Groups" tab under the team or role. MuleSoft recommends using the Teams feature to manage user permissions. See below links for more details:
How to map Azure AD groups to Anypoint Platform Teams while performing SSO
Anypoint Platform Single Sign-On (SSO) using SAML Troubleshooting Guide
External identity migration - How to prevent duplicate users being created
001114976

We use three kinds of cookies on our websites: required, functional, and advertising. You can choose whether functional and advertising cookies apply. Click on the different cookie categories to find out more about each category and to change the default settings.
Privacy Statement
Required cookies are necessary for basic website functionality. Some examples include: session cookies needed to transmit the website, authentication cookies, and security cookies.
Functional cookies enhance functions, performance, and services on the website. Some examples include: cookies used to analyze site traffic, cookies used for market research, and cookies used to display advertising that is not directed to a particular individual.
Advertising cookies track activity across websites in order to understand a viewer’s interests, and direct them specific marketing. Some examples include: cookies used for remarketing, or interest-based advertising.