Single sign-on (SSO) makes logging into Dialpad easy and convenient. By configuring and enabling this integration, you can log in to Dialpad using SAML-based SSO after you've been authenticated by Azure (Microsoft Login).
The steps below use an example domain called projectgemma.com. Wherever applicable, this value should be substituted with the proper domain identifier for your company.
Enabling SAML in Dialpad
1. Log into Dialpad and click on Admin Settings. Next, select My Company from the drop down on top of the screen and click on Authentication on the left pane. Under Authentication, click on SAML.
2. On the SAML configuration page, click on dropdown menu for Choose your provider and select Custom. You should see a page that looks similar to the image below. Take note of the values for SP SSO Url (ACS) and SP Entity ID. The values will differ based on the domain identifier of your company.
3. Be sure to keep this tab open — we'll be revisiting this page after configuring SAML on Azure.
Configuring SAML in Azure
1. Navigate to the Azure Portal.
2. Click on Show portal menu — this will open up options on the left pane. Then, navigate to Azure Active Directory.
3. Ensure that the tenant being administered is the proper one.
4. On the left pane, click on Enterprise applications. Then, click on New application. You can find it on top of the pane.
5. After clicking New Application, search for Azure AD SAML Toolkit and click on the resulting tile.
6. A new pane will appear on the right-hand side. In that pane, provide a Name to the application and click on Create. The process will take a few seconds.
7. Once the application is created, you'll be redirected to its main page. Taking the above example, the below screenshot shows the “Dialpad SAML” application’s main page. On this page, under the Manage section, click on Single sign-on. On the next page, click on the SAML tile.
8. After clicking on the SAML tile, you'll be taken to a new page. Click on Edit in the Basic SAML Configuration tile. We're going to populate the attributes under this tile with the values we retrieved from Dialpad (see: step 2 in "Enabling SAML in Dialpad").
9. On the resulting page, you'll need to provide values for the three attributes requested as outlined in the following chart. Then click on Save.
10. Once the previous page is saved, you'll be taken back to the Setup Single Sign On page. Here, navigate to the User Attributes & Claims tile and click Edit.
11. On the resulting page, click on Add new claim. For the Name field, type in Email and for the Source attribute field, type in user.mail as shown below. Then click on Save.
12. You should be able to see the newly added claim in the attributes main page, like below:
13. Back on the Setup Single Sign-On with SAML page, locate the Certificate (Base64) attribute in the SAML Signing Certificate tile and click on Download.
14. On the Set up Azure AD SAML Toolkit tile, take a note of the values against Login URL and Azure AD Identifier as shown below:
15. Switch back to the Dialpad SAML Configuration page (that's was the last step in "Enabling SAML in Dialpad"). We will populate the left over attributes with the values obtained from steps 13 and 14 in this section. Below are the mappings. Finally, click on Save.
Assign a user to the created enterprise application in Azure
1. Back in Azure, navigate to the configured enterprise application (it's called Dialpad SAML in the screenshot below). Here, click on Users and groups and then click on Add user/group.
2. Select a user to test out the SAML-based login and add click on Assign.
3. The user should now be listed in the main page, as shown below:
Testing User Login
1. Head to https://www.dialpad.com/login and click on “Sign in with another provider.”
2. On the resulting page, enter the domain of your company. Click on Next, and you'll be redirected to Microsoft Login to get authenticated. After entering your credentials, you should be logged into Dialpad via SAML.