Edit Your Microsoft Active Directory SSO Settings

You can update your existing Microsoft Active Directory SSO configuration using the following steps:

Note:

Only platform administrators or users with appropriate permissions can edit SSO settings.

Prerequisite

When editing your Microsoft Active Directory SSO configuration, you may need to reimport updated SAML metadata. Ensure that the Federation Metadata XML document is available in one of the following ways:

Option 1: Use Existing Federation Metadata URL

If your organization has already published a Federation Metadata URL (for example, via public DNS or internal ADFS endpoint), you can use the same URL to import metadata again.

Ensure the URL follows the standard format:

https://<your-domain>/federationmetadata/2007-06/federationmetadata.xml

Option 2: Download Updated Federation Metadata XML

If the file must be refreshed or manually imported, follow these steps:

To download the federation metadata XML, do the following:

  1. Sign in to the ADFS server and open the AD FS Management Console..

  2. In the AD FS folder in the left pane, expand Services and click Endpoints.

  3. In the Metadata section, locate the entry of the type Federation Metadata with a URL path ending in /federationmetadata/2007-06/federationmetadata.xml. Copy this URL.

  4. Append your domain to the copied URL. The URL format should look like this: https://{domain-name}/federationmetadata/2007-06/federationmetadata.xml

  5. Paste the adjusted URL into a browser’s address bar and press Enter.

  6. Download the file and save it to your computer.

    You can now use this file to update the SSO configuration in Calibo by selecting the Import from IdP Metadata File option.

Steps to Edit SSO Settings

To edit your SSO configuration for Microsoft Active Directory, do the following:

  1. Go to Platform Setup > Security & SSO.

  2. In the Configured Identity Provider section, you will see your existing Microsoft Active Directory SSO configuration.

  3. In the SSO SAML Configuration card, click the ellipsis (⋯) and select Edit.

  4. The following confirmation message appears. Click Proceed to continue.

    Confirmation message before editing Azure AD SSO configuration

  5. On the Edit Single Sign-On screen, your existing Microsoft Active Directory SSO configuration is displayed. You can review or edit the values as mentioned in the following steps:

    1. Configured Domain

    When editing Microsoft Active Directory SSO settings, the domain field is auto-populated with the domain that was used in your previous configuration.

    You cannot edit this field — Calibo enforces the same domain to ensure continuity of user identity mapping.

    Select the following checkbox:

    Auto-populated domain field and domain confirmation check box

    2. Configure SSO Details

    In this section, you can edit your SAML configuration details of Microsoft Active Directory. Do the following:

    1. Make changes to your SSO details by using one of the following options:

    2. Click Previous to return to the previous screen.

      Click Next to proceed.

      Click Cancel and then, in the confirmation message, click Yes to discard your unsaved identity provider configuration changes and go back to the previous screen.

    3. Create AD FS Relying Party Trust

    At this stage, the SSO configuration updates in the Calibo Accelerate platform interface are complete and the federation metadata file is available for download.

    Federation metadata file available for download

    To complete the SSO configuration in Microsoft Active Directory, download and save the federation metadata XML file.

    Create a relying party trust in the Active Directory Federation Services (AD FS) Management Console by using the downloaded XML file. This establishes a trust relationship between Calibo Accelerate and your Active Directory Federation Services (AD FS) instance. This trust allows AD FS to authenticate users on behalf of Calibo Accelerate.

    For more details, see Creating a Relying Party Trust in the AD FS Management Console.

    4. Validate Single Sign-On

    1. After you create the AD FS relying party trust for Calibo Accelerate successfully, on the screen from where you downloaded the federation metadata XML file, in the Validate Single Sign-On section, click Validate.

      Validating MSAD SSO

    2. This takes you to the Calibo Accelerate platform sign-in screen. Use SSO credentials for user authentication. After a successful authentication redirection and SSO validation, the following success message is displayed.

      SSO validation successful for Calibo Accelerate Platform

    3. Return to the SSO configuration screen and click the Refresh icon to complete your SSO configuration.

      Click Refresh to complete MSAD SSO configuration in Calibo Accelerate

    4. After you see the message confirming that your SSO validation is successful, click Finish to complete the configuration.

      Click Finish to return to the Security and SSO screen

    After you click Finish, your current session will automatically end. You will be logged out of the platform and will need to sign in again using your valid SSO credentials.

Steps to Edit LDAP Configuration

You may need to update LDAP settings if your Active Directory server details change, if you rotate service account credentials, or if connection testing fails due to outdated Bind DN or password.

To update the LDAP settings used for Single Sign-On:

  1. On the Platform Setup > Security & SSO screen, go to the Configured Identity Provider section.

  2. Under Microsoft Active Directory, locate the LDAP card.

  3. Click the ellipsis (︙) menu on the LDAP card and select Edit.

  4. On the Configure LDAP for Single Sign-on screen, update the necessary connection parameters:

    • LDAP Server Address: IP address or host name of the LDAP server.

    • Bind DN: Distinguished Name (DN) used to authenticate with the server.

    • Bind Password: Password associated with the Bind DN.

  5. Secure connection details with password (optional)

    To password-protect your LDAP server connection details, enable this option, enter a password, and then retype it to confirm.

  6. Click Test Connection to verify the updated details.

  7. Save the updated configuration to apply the changes.