Skip to main content

Azure SSO

You can connect OnRamp to your organization’s Azure Active Directory (AD) to give your team a seamless, secure sign-in experience.

Paul Holder avatar
Written by Paul Holder
Updated over a month ago

Summary / When to Use This

You can connect OnRamp to your organization’s Azure Active Directory (AD) to give your team a seamless, secure sign-in experience. Once enabled, users can sign in with their existing Azure credentials instead of managing a separate OnRamp password.


Before You Begin

  • SSO is an add-on feature. Contact your Customer Success Manager or email support@onramp.us to enable it.

  • You’ll need Owner permissions in OnRamp and admin rights in Azure AD.

  • Users must have a valid OnRamp account with the same email address as their Azure AD account.

  • Only SP-initiated login is supported. Users must log in via app.onramp.us, not directly through Azure.


Steps to Follow

1. Navigate to SSO Settings in OnRamp

  1. In OnRamp, go to Settings > SSO.

  2. Toggle on Enforce SAML SSO.

  3. Copy the Assertion Consumer Service URL and SAML Entity ID (you’ll need these in Azure).


2. Create a New Enterprise Application in Azure

  1. In the Azure portal, go to Azure Active Directory.

  2. Click Enterprise Applications in the sidebar.

  3. Select New Application.

  4. Choose Create your own application.

    • Enter a name (e.g., OnRamp SAML SSO).

    • Select Integrate any other application you don’t find in the gallery (Non-gallery).

  5. Click Create.


3. Configure SAML SSO in Azure

  1. Open your new application.

  2. Under Set up single sign on, click Get Started.

  3. Select SAML as the SSO method.

  4. In the Basic SAML Configuration section, click Edit.

  5. Enter the values from OnRamp:

    • Identifier (Entity ID) → paste the OnRamp Entity ID

    • Reply URL (Assertion Consumer Service URL) → paste the OnRamp ACS URL

  6. Click Save.


4. Connect Azure Back to OnRamp

  1. In Azure, scroll to the SAML Signing Certificate section.

  2. Copy the App Federation Metadata URL.

  3. Return to OnRamp.

  4. Paste the URL into the SAML Metadata URL field.

  5. Click Enable SAML SSO.

  6. After a moment, you’ll see a success notification in OnRamp confirming SAML is active.


5. Add Users to Azure and OnRamp

  • Assign users to the OnRamp SSO application in Azure.

  • Make sure each user also has an OnRamp account with the same email address.


Tips & Troubleshooting

  • If users can’t log in, confirm:

    • Their OnRamp email matches their Azure AD email.

    • They’re logging in at app.onramp.us (not via Azure).

    • The SAML Metadata URL was copied correctly.

  • Still stuck? Reach out to support@onramp.us with screenshots of your Azure setup.


Did this answer your question?