Enabling Single Sign-On (SSO) for SqlDBM: A Comprehensive Guide
This guide provides step-by-step instructions to enable SSO for your SqlDBM account. Whether you’re using Entra ID (formerly Azure AD) or Okta, we’ve got you covered. Once you have completed the steps below, notify us by sending an email to submit_ticket@sqldbm.com. If you encounter any issues or have questions, our support team is ready to assist you.
Enabling SSO with Entra ID (Formerly Azure AD)
Steps for IT Teams:
1. Create Application in Azure Active Directory:
Navigate to the Azure Active Directory portal
Go to ‘Enterprise applications’ → ‘New application’ → ‘Create your own application’.
Name the application “SqlDBM”.
Select “Integrate any other application you don’t find in the gallery”.
2. Assign Application to Users:
Assign the app to Azure AD users, ensuring the admin account for your subscription is included.
3. Set up SAML:
In the app settings, go to "Set up single sign-on" and choose "SAML".
Configure the following:
Basic SAML Configuration:
Identifier (Entity ID): https://sqldbm.com/Saml2
Sign on URL: leave blank
Relay state: leave blank
Logout Url: https://sqldbm.com/Account/LogOffSso
User Attributes and Claims:
emailaddress -> user.mail (or correct claim mapping which reflects the same emailaddress value for user as one used in sqldbm)
name -> user.displayname
The claim must be a fully qualified claim address.
For those who wish to download our Metadata to pre-populate the basic SAML configurations into Azure, please click on the SP Metadata:
https://www.sqldbm.com/AzureActiveDirectory/Saml2
4. Provide Metadata URL (IMPORTANT):
Send us the App Federation Metadata Url and your organization's principal domain (e.g., something.onmicrosoft.com).
Additional Steps:
Wait for SqlDBM to enable integration on our side.
Login to SqlDBM via Azure Active Directory using the admin account’s principal name. (It ends with yourorg.onmicrosoft.com) and can be found at the top of the user’s profile in the Azure Active Directory portal, just under the user name
Ensure users assigned to SqlDBM in Azure Active Directory can log in via this method.
Enabling SSO with Okta
Steps for IT Teams:
Add SqlDBM Application in OKTA:
In the OKTA admin console, navigate to the “Applications” tab.
Click “Add application” and search for "SqlDBM".
Add the Application:
2. Provide Metadata URL:
After adding the application, click on its name in the “Applications” tab.
Go to the “Sign On” tab.
Copy the “Identity Provider Metadata” URL and provide it to us.
Note:
Once you complete these steps, wait for us to set up the integration on our side.
Final Steps and Support
Once you have completed the above steps, notify us by sending an email to submit_ticket@sqldbm.com. If you encounter any issues or have questions, our support team is ready to assist you.
When raising a ticket to enable SSO for your SqlDBM account, please include the details specified in the instructions above for your chosen SSO method (Entra ID or Okta). If your setup involves a different case or configuration not covered in this guide, specify your requirements in the ticket. Our team is dedicated to working with you to ensure your SSO configuration is set up properly and meets your organization's needs.