Hello there!

Need Help? We are right here!

support
miniOrange Email Support
success

Thanks for your inquiry.

If you dont hear from us within 24 hours, please feel free to send a follow up email to info@xecurify.com

Azure DevOps Single Sign-On (SSO)
miniOrange provides a ready to use Single Sign-On (SSO) integration for Azure DevOps. This Single Sign-On solution ensures that you are ready to roll out secure access to your clients and users to log in into Azure DevOps.

Azure DevOps Single Sign-On (SSO)

Azure DevOps Single Sign-On (SSO) integration by miniOrange provides secure access and full control over multiple Web and SaaS applications to enterprise users and clients. Azure DevOps SSO let users to Single Sign-On into Azure DevOps account with one set of login credentials, eliminating user-managed passwords and the risk of phishing. Azure DevOps Single Sign-On set up leverages the existing on-premise Active Directory infrastructure and provides seamless integration without the need to manage multiple on-premise and cloud identities.

miniOrange supports both IdP (Identity Provider) and SP (Service Provider) initiated Single Sign On (SSO)

  • IdP Initiated Single Sign On (SSO)

    In IdP Initiated Login, SAML request is initiated from miniOrange IdP.

    • Enduser first authenticates through miniOrange Idp by login into miniOrange Self Service Console.
    • The Enduser will be redirected to their Azure DevOps account by clicking the Azure DevOps icon on the Enduser Dashboard - there is no need to log in again.
  • SP Initiated Single Sign On (SSO)

    In SP Initiated Login, SAML request is initiated by Azure DevOps.

    • An Enduser tries to access their Account by going to Azure DevOps domain.
    • Here they can enter the miniOrange login credentials and login to their Azure DevOps Account.

We can connect with any directory

miniOrange provides user authentication from external directories like Microsoft Active Directory, Azure AD,AWS Cognito etc.

Step 1: Prerequisites

1.1: Sync On-Premise Active Directory with Azure Active Directory

    NOTE: If you want to use your On-Premise Active Directory as a user store to Single Sign-On into Azure DevOps then follow the below steps to sync your AD and Azure AD.

  1. Download the Azure AD Connect
  2. Run the Azure AD installer on your domain machine and follow the setup.

1.2: Verify your UPN Domain in Azure Portal

  1. In the Azure portal navigate to Azure Active Directory >> Custom domain names and click on Add custom domain.
  2. Enter the full domain name in the right pane that pops up and click on Add domain.
  3. Azure DevOps Single Sign-On (SSO) Add custom domain

  4. A new window will open up with TXT/MX records for the domain. You will have to add the resented entry in your domain name registrar.
  5. Azure DevOps Single Sign-On (SSO) Add domain record

  6. Click on verify once you have added the entry

Step 2: Setup a Custom Branded URL in miniOrange Admin Console

Single Sign-On into Azure DevOps requires a custom branded URL to be set. Access to miniOrange and connected resources will need to be through the custom branded URL in the format: https://<custom_domain>.xecurify.com/moas

  • Login to miniOrange Admin Console.
  • Navigate to Customization >> Branding Configuration
  • Under Basic Settings, set the Organization Name as the custom domain name and Save. Once that is set, the branded login URL would be of the format https://<custom_domain>.miniorange.com/moas
  • Azure DevOps Single Sign-On (SSO) setting up branding

Step 3: Choose Your User Directory

3.1: Setup AD as User Directory

  1. Log in to miniOrange Admin Console.
  2. From the Side Menu, Click on User Stores >> Add User Store

    Azure DevOps Single Sign-On (sso) configure user store

  3. Select User Store type as AD/LDAP.
  4. Azure DevOpsSingle Sign-On (sso) select AD/LDAP as user store

    1. STORE LDAP CONFIGURATION IN MINIORANGE: Choose this option if you want to keep your configuration in miniOrange. If active directory is behind a firewall, you will need to open the firewall to allow incoming requests to your AD.
    2. STORE LDAP CONFIGURATION ON PREMISE: Choose this option if you want to keep your configuration in your premise and only allow access to AD inside premises. You will have to download and install miniOrange gateway in your premise.
    3. Azure DevOps Single Sign-On (sso) select ad/ldap user store type
  5. Enter LDAP Display Name and LDAP Identifier of your choice. Select Directory Type as Active Directory.
  6. Enter the LDAP Server URL or IP Address against LDAP Server URL field.
  7. Go to AD FS-> Domain-> respective Users -> Properties-> Attribute Editor. Now copy the value of distinguishedName and paste it against Bind Account DN.
  8. Azure DevOps  Single Sign-On (sso)configure user bind account domain name

  9. Enter the valid password for the user from above step.
  10. Search Base is the location in the directory where the search for a user begins.
  11. Azure DevOps  Single Sign-On (sso)configure user search base

  12. If you want to add extra conditions on user search you can add it in Search Filter. Select a suitable Search Filter from the Drop-Down. To use custom Search Filter select "Custom Search Filter" option and provide the search filter in the input field that shows up.
  13. Azure DevOps Single Sign-On (sso)configure user search filter

  14. You can also configure following options while setting up AD.
  15. Azure DevOps Single Sign-On (sso) configure ldap options

    Here's the list of the attributes and what it does when we enable it. You can enable/disable accordingly.

    Attribute Description
    Activate LDAP All user authentications will be done with LDAP credentials if you Activate it
    Sync users in miniOrange Users will be created in miniOrange after authentication with LDAP
    Backup Authentication If LDAP credentials fail then user will be authenticated through miniOrange
    Allow users to change password This allows your users to change their password. It updates the new credentials in your LDAP server
    Enable administrator login On enabling this, your miniOrange Administrator login authenticates using your LDAP server
    Show IdP to users If you enable this option, this IdP will be visible to users
    Send Configured Attributes If you enable this option, then only the attributes configured below will be sent in attributes at the time of login

  16. Enable Send Configured Attributes and configure "objectguid" in both the text boxes that appear
  17. Azure DevOps Single Sign-On (SSO) Add ImmutableID

  18. Click on Save. After this, it will show you the list of User stores. Click on Test Configuration to check whether you have enter valid details. For that, it will ask for username and password.
  19. Azure DevOps Single Sign-On (sso) test ad/ldap connection

  20. On Successful connection with LDAP Server, a success message is shown.
  21. Azure DevOps Single Sign-On (sso) ldap successful connection

  22. Click on Test Attribute Mapping.
  23. Azure DevOps Single Sign-On (sso) test attributes mapping

  24. Enter a valid Username. Then, click on Test. Mapped Attributes corresponding to the user are fetched.
  25. Azure DevOps Single Sign-On (sso) fetch mapped attributes for user

  26. After successful Attribute Mapping Configuration, go back to the ldap configuration and enable Activate LDAP in order to authenticate users from AD/LDAP.
  27. Refer our guide to setup LDAPS on windows server.


3.2: Setup miniOrange as a User Store

  1. Log in to miniOrange Admin Console.
  2. There are 3 ways to setup miniOrange as an Identity Source

    3.2.1 Create User in miniOrange

    • Click on Users >> Add User.
    • Azure DevOps Single Sign-On (SSO)add user in miniOrange

    • Here, fill the user details without the password and then click on the Create User button.
    • Azure DevOpsSingle Sign-On (SSO) add user details

    • After successful user creation a notification message "An end user is added successfully" will be displayed at the top of the dashboard.
    • Azure DevOpsSingle Sign-On (SSO) add user details

    • Click on On Boarding Status tab. Check the email, with the registered e-mail id and select action Send Activation Mail with Password Reset Link from Select Action dropdown list and then click on Apply button.
    • Azure DevOps Single Sign-On (SSO) email action

    • Now, Open your email id. Open the mail you get from miniOrange and then click on the link to set your account password.
    • On the next screen, enter the password and confirm password and then click on the Single Sign-On (SSO) reset password button.
    • Azure DevOps reset user password
    • Now, you can log in into miniOrange account by entering your credentials.

    3.2.2 Bulk Upload Users in miniOrange via Uploading CSV File.

    • Navigate to Users >> User List. Click on Add User button.
    • Azure DevOps Single Sign-On (SSO)add user via bulk upload

    • In Bulk User Registration Download sample csv format from our console and edit this csv file according to the instructions.
    • Azure DevOps Single Sign-On (SSO) download sample csv file

    • To bulk upload users, choose the file make sure it is in comma separated .csv file format then click on Upload.
    • Azure DevOps Single Sign-On (SSO) bulk upload user

    • After uploading the csv file successfully, you will see a success message with a link.
    • Click on that link you will see list of users to send activation mail. Select users to send activation mail and click on Send Activation Mail. An activation mail will be sent to the selected users.

    3.2.3 Self User Registration

    • miniOrange self user registration allows end users to register themselves using customized registration form. miniOrange admin users can customize the registration form by adding more custom fields according to their choice. Follow the miniOrange guide to customize user self registration page.

Step 4: Setup Azure DevOps - Azure DevOps in miniOrange

  • Login into miniOrange Admin Console.
  • Go to Apps >> Manage Apps.
  • Azure DevOps Single Sign-On (SSO) manage apps

  • Click on Add Applicaton button.
  • Azure DevOps Single Sign-On (SSO) add app

  • In Choose Application Type click on Create App button in SAML/WS-FED application type.
  • Azure DevOps Single Sign-On (SSO) choose app type

  • In the next step, search for Azure DevOps. Click on Azure DevOps app.
  • Azure DevOps Single Sign-On (SSO) add Azure DevOps app

  • Make sure the SP Entity ID or Issuer is: urn:federation:MicrosoftOnline
  • Make sure the ACS URL is: https://login.microsoftonline.com/login.srf
  • Click on Next.
  • Azure DevOps Single Sign-On (sso) configuration steps

  • Select External IDP Attribute from the dropdown and add objectguid in the text-box that appears.
  • Add an attribute with attribute name as IDPEmail and select attribute value as E-mail Address.
  • Azure DevOps Single Sign-On (sso) configuration steps

  • Set the login policy. You can choose to enable 2FA for login or have users login using a standard username-password.
  • Click on Save to configure Azure DevOps.
  • Azure DevOps Single Sign-On (sso) configuration steps

Step 5: Configure Microsoft Online Services

  • Click on Select dropdown and choose Metadata.
  • Azure DevOps Single Sign-On (SSO) Select Metadata

  • Click on the Download Federate Domain Script button under "INFORMATION REQUIRED TO AUTHENTICATE VIA EXTERNAL IDPS"
  • Azure DevOps Single Sign-On (SSO) Download federate domain script button.

  • Enter the domain name that you want to federate and click on Download. Note: You cannot federate your default "onmicrosoft.com" domain. To federate your Azure DevOps tenant, you must add a custom domain to Azure DevOps.
  • Azure DevOps Single Sign-On (SSO) Download Federate Domain Script

  • After downloading the script, Open PowerShell run the federate_domain script using: cd ./Downloads powershell -ExecutionPolicy ByPass -File federate_domain.ps1
  • Azure DevOps Single Sign-On (SSO) Run Federate Domain Script

  • Your domain is now federated. Use the commands below to check your federation settings: Connect-MsolService Get-MsolDomainFederationService
  • Azure DevOps Single Sign-On (SSO) Verify Federated Domain

Step 6: Now sign in to your Azure DevOps account with miniOrange IdP by either of the two steps:

    1. Using SP initiated login :-

    1. Go to Azure DevOps Login and click on sign-in
    2. You will be redirected to Microsoft Online portal. Here you have to enter the UPN of the user.(It should contain the domain that is federated with miniOrange)
    3. Now you will be redirected to miniOrange IdP Sign On Page.

    4. Enter Microsoft UPN for Single Sign-on SSO integration with Azure DevOps

    5. Enter your login credential and click on Login. You will be automatically logged in to your Azure DevOps account.
    6. Entering Azure DevOps Credentials you have successfully loginto Azure DevOps using Single Sign-On SSO integration

    2. Using IdP initiated login :-

    1. Login to your miniOrange Self Service Console as an End User and click on the Azure DevOps icon on your Dashboard.
    2. Once you click on Azure DevOps you don't need to enter credentials again you will be redirected to Azure DevOps account.
    3. Select Azure DevOps to Single Sign-On (sso) to Azure DevOps

For further details refer following Documents :

  1. Azure DevOps SSO integration with on-premises environments

Why Our Customers choose miniOrange Secure Identity Solutions ?


24/7 Support

miniOrange provides 24/7 support for all the Secure Identity Solutions. We ensure high quality support to meet your satisfaction.

Try Now

Affordable Pricing

miniorange provides most affordable Secure Identity Solutions for all type of use cases and offers different packages based on customer's requirement.

Request A Quote


We offer Secure Identity Solutions for Single Sign-On, Two Factor Authentication, Adaptive MFA, Provisioning, and much more. Please contact us at -

   +1 978 658 9387 (US)   ,   +91 97178 45846 (India)    |       info@xecurify.com