Supported Features
Tubular currently supports the following features:
- Service Provider (SP) Initiated flow
Tubular does not support the following features:
- Identity Provider (IDP) Initiated Flow
- SAML JIT (Just In Time) Provisioning
Step 1: Set up Microsoft Azure/Entra ID as SAML identity provider (IDP)
- Sign in to the Azure portal.
- On the left navigation pane, select the Azure Active Directory service.
- Navigate to Enterprise Applications and then select All Applications.
- Add a new application by selecting New application.
- Select Non-gallery application.
- Set “Tubular” as the name of the application and click Add.
- Assign a test user to the application (required)
- Go to Configure single sign-on (required).
- Select SAML-based Sign-on in the Single Sign-on Mode.
- Enter the following values into the appropriate fields:
- Identifier: urn:auth0:tubularlabs:CONNECTION_NAME
- Reply URL: https://tubularlabs.com/auth/oauth/login?connection=CONNECTION_NAME
-
User Identifier:
user.mail
- In the User Attributes and Claims section, select the Edit icon.
- Verify that the Name Identifier Value is set to
user.mail. To modify this value, select Edit. Change the name identifier format toEmailAddressand the Source attribute value toEmail. - In step 3, download the Certificate (Base64)
- In step 4, copy the Login URL and put it in a safe place so you can access it later.
- Click Finish
The CONNECTION_NAME is a unique identifier for your connection. It should only contain alphanumeric characters and hyphens and must be less than 128 characters in length.
We recommend that you include your company name as a part of the connection name to ensure that the name is unique. For example, Acme Corp may name their connection Acme-Login.
If you plan on setting up a TEST or STAGING connection first, give it the same connection name in Tubular as you plan to use for your live connection.
Step 2: Enable Tubular SAML App
- Sign in to the Azure portal.
- On the left navigation pane, select the Azure Active Directory service.
- Navigate to Enterprise Applications and then select All Applications.
- In the application list, select Tubular.
- In the app's overview page, find the Manage section and select Users and groups.
- Select Add user, then select Users and groups in the Add Assignment dialog.
- Type in the full name, email address, or full group name of the user/group you are interested in assigning into the Search by name or email address search box.
- Click the checkbox next to the user/group to add them to the Selected list
- Continue to select users/groups to add to the Selected list.
- When you are finished, click the Select button to add them to the list of users and groups to be assigned to the application.
- Click the Assign button to assign the application to the selected users.
Step 3: Set up Tubular as a SAML 2.0 service provider (SP)
Once you’ve finished configuring Microsoft Azure as your IDP, you can send over your connection details to your Customer Success Manager or our Support team to finalize integration of your Azure with Tubular. Send us over the following pieces of information that you should have saved from your steps above:
- The Connection Name you configured in step 1.
- The Identity Provider Single Sign-On URL you copied at the end of step 1.
- The X.509 Certificate, the entire contents of the file you downloaded in step 1. This is an X.509 Certificate that’s required for SSO setup.
Our team will then input these fields to make the connection to your Azure instance.
After your credentials are authenticated, you and all of your seat holders should now be redirected to sign in using your IDP when signing into Tubular Labs.
Once SSO is set up for your organization, it will be the only method your users can use to log into the platform. We don’t currently have the option for some users to still use password for logging in after SSO is linked. User passwords will no longer be managed through Tubular. If a user attempts to reset their Tubular password it will have no effect. Please refer your users to your internal help desk for assistance recovering their Microsoft account.