Skip to content

Microsoft Azure AD (non-SAML) SSO Configuration

The Valtix Controller can integrate with Microsoft Azure AD (non-SAML) SSO for Valtix Portal access user authentication.

Azure AD Setup

The Microsoft Azure AD configuration steps are as follows:

  1. Open Azure Active Directory on your web browser: Azure AD Portal

  2. In the Overview section, make note of the Primary domain information:

  3. Click on App registrations on the left hand sidebar, then select New Registration and enter the following values:

    • Name: valtix-sso
    • Supported account types: Accounts in any organizational directory (Any Azure AD Directory - Multi-tenant)
    • Redirect URI:
      • Platform: Web
      • URL:
  4. Click Register to save

  5. Make note of the Application (client) ID for the newly registered application:

  6. Click on Certificates & secrets on the left hand sidebar, then select New client secret. Enter the following values:

    • Description: valtix-sso-secret
    • Expires: 12 months (select what is most appropriate)
  7. Click Add to save

  8. Make note of the Client secret Value:

  9. Open the Azure AD page: Azure AD

  10. Click on Groups on the left hand sidebar, then select New Group

  11. Create the following Groups and Group properties:

    • Group type: Security
    • Group name:
      • valtix_admin_super
      • valtix_admin_rw
      • valtix_admin_read-only
    • Associate Users with one or more Groups created above. If a User is assigned to more than one Group, the User will be granted the role with the highest permission level. Example: If a User is assigned to Groups valtix_admin_rw and valtix_admin_read-only, the User will be assigned a role of valtix_admin_rw since it is a role with higher permissions than valtix_admin_read-only.
  12. Click Create to save

The configuration required on Azure AD is complete.

Please provide Valtix with the following information obtained during the configuration steps so that we may complete the configuration on the Valtix backend:

  • Primary domain (step 2)
  • Application (client) ID (step 5)
  • Client secret Value (step 8)