Integrating Azure SAML with Dialpad
    • 11 Jan 2024
    • 2 Minutes to read
    • Dark
      Light
    • PDF

    Integrating Azure SAML with Dialpad

    • Dark
      Light
    • PDF
    • New

    Article Summary

    Azure's single sign-on feature allows users to easily log in to Dialpad using their Azure login credentials. To enable this integration, users need to have SAML permissions and configure SAML in both Dialpad and Azure. In Dialpad, users should navigate to the Admin Settings, select My Company, go to Authentication, choose SAML, and select Custom. They should then note the SP SSO URL and SP Entity ID values. In Azure, users should navigate to Azure Active Directory, select Enterprise applications, search for Microsoft Entra SAML Toolkit, name the application, and create it. They should then configure SAML by entering the SP SSO URL and SP Entity ID attributes from Dialpad. Users also need to provide values for mapped attributes and download the SAML Signing Certificate. Finally, they can assign a user in Azure and test the SAML-based login on Dialpad.

    Azure's single sign-on (SSO) lets you easily log in to Dialpad with your Azure (Microsoft) login. 

    Let's dive into the details.

    Who can use this feature

    The Azure SAML integration is available to Dialpad Ai Voice, Ai Sales, and Contact Center customers on Standard, Pro, and Enterprise plans. 

    *If you're on a Standard or Pro level plan, you'll need to contact Customer Support to enable this feature. 

    You must have an Azure Active Directory subscription that allows the addition of SAML Toolkit SSO.  

    Enable SAML In Dialpad

    Before enabling this integration, make sure you have SAML permissions.

    If you don't see the SAML section in the Authentication section of your Company Settings, please contact Dialpad Support to have this enabled. 

    Note: 
    The steps below use an example domain called projectgemma.com. Wherever applicable, substitute this value with the proper domain identifier for your company.

    To enable SAML on your account, head to your Admin Settings from Dialpad.com 

    1. Select My Company 
    2. Navigate to Authentication 
    3. Select SAML 
    4. Choose Custom from the 'Choose your provider' menu
    5. Take note of the listed SP SSO URL (ACS) and SP Entity ID values 


    Keep this tab open — we'll revisit this page after configuring SAML on Azure.

    Configure SAML in Azure

    Next, its time to configure SAML in Azure:

    1. Navigate to the Azure Portal
    2. Select Show portal menu — this will open options on the left pane. 
    3. Navigate to Azure Active Directory
      1. Ensure that the tenant is correct
    4. Select Enterprise applications
    5. Select  New application
    6. Search for, and then select Microsoft Entra SAML Toolkit

    7. In the pop-up side widow, Name the application
    8. Select Create
      1. The page will take a few moments to configure. Once the application is created, you'll be redirected to its main page. 
    9. Navigate to the Manage section of the Dialpad SAML application’s main page
    10. Select Single sign-on
    11. Select SAML 
    12. In the basic SAML Configuration tile, select Edit
    13. Here, enter the SP SSO URL (ACS) and SP Entity ID attributes from Dialpad 
    14. Next, you'll need to provide values for the three mapped attributes, as detailed below.

    15. Select Save
      Note: 
      The screenshot above shows the attribute values containing the domain https://dialpadbeta.com. For your purposes, all these values should read https://dialpad.com.
    16. On the resulting page, select Add new claim
      • In the Name field, enter Email 
      • In the Source attribute field, enter user.mail
    17. Select Save
      1. Under User Attributes & Claims, you'll now see the newly added claim.
    18. Back on the Setup Single Sign-On with SAML page, locate the Certificate (Base64) attribute in the SAML Signing Certificate tile
    19. Select Download
    20. On the Set up Azure AD SAML Toolkit tile, take note of the values against Login URL and Azure AD Identifier 
    21. Switch back to the Dialpad SAML Configuration page. Here, populate the left over attributes with the values obtained from steps 13 and 14 in this section.
    22. Select Save

    Assign a user in Azure 

    To assign a User in Azure:

    1. Navigate to the configured enterprise application (it's called Dialpad SAML in the screenshot below)
    2. Select Users and Groups 
    3. Select Add user/group
    4. Choose a user to test out the SAML-based login, then select Assign
    5.  The user should now be listed in the main page, as shown below

    Test user login

    Now that Azure SAML has been configured, its time to test it. 

    1. Head to https://www.dialpad.com/login 
    2. Select  Log in with another provider
    3. Enter the domain of your company
    4. Select Next

      That's it! You'll be redirected to Microsoft Login for authentication. After entering your credentials, you should be logged into Dialpad via SAML.





    Was this article helpful?