Configuring SAML SSO for Active Directory Users4 minutes to read
In general, user accounts imported from Active Directory (AD) into Password Manager Pro have their login names stored in the following format: Loginname. When SAML Single Sign-on (SSO) is configured for AD users, you can set the Windows account name as the incoming claim type to match the default login format. This method will work for all types of SAML SSO identity providers. For the sake of an example, we have provided the steps to configure this in the Azure AD portal. Trying to configure SAML SSO for users imported from Active Directory presents the following problem: The default login name of the AD users will be in the format Loginname. However, during an Azure SAML response, Password Manager Pro retrieves a user's email address as their login name. During the Azure AD SAML SSO process, this login name format mismatch causes a problem, preventing the authentication process from being completed. As a workaround for this challenge, create a custom attribute in your AD and add the Loginname value in the custom attribute section to sync it with the Azure AD portal. Follow the below steps:
1. Setting up a Custom Attribute
2. Setting up a Claim in the Azure PortalOnce you have added the custom attribute, proceed with the below steps to set up a claim for the NameID in the Azure AD Portal.
3. Editing the System Properties File and Complete the ConfigurationOnce you create the new user attribute in the Azure AD portal for the Password Manager Pro Enterprise application, follow the below steps for the custom attribute configuration to be complete:
Now, the custom attribute configuration is complete. Start the Password Manager Pro service and configure Azure AD SAML SSO as usual. ©2025, ZOHO Corp. All Rights Reserved. | |