This guide walks through how to configure SAML Single Sign-On (SSO) for Re-Leased using Azure Active Directory (Azure AD). Complete this setup in Azure AD first, then enter the details in Re-Leased's Manage Single Sign On settings.
See also: Enabling SAML SSO in Re-Leased
Step 1: Add Re-Leased to Azure Active Directory
Log in to the Microsoft Azure Portal and navigate to Azure Active Directory > Enterprise Applications.
Click New Application, then Create your own application.
Select Integrate any other application you don't find in the gallery (Non-gallery), name it Re-Leased, and click Create.
Select the Single sign-on blade and choose SAML.
Step 2: Basic SAML Configuration
Click Edit under Step 1 (Basic SAML Configuration).
Using the values from Re-Leased's Manage Single Sign On settings, fill in:
Re-Leased Audience URI → Azure Identifier (Entity ID)
Re-Leased ACS URL → Azure Reply URL (Assertion Consumer Service URL)
Re-Leased Sign-on URL → Azure Sign on URL (Optional)
Leave all other fields empty, click Save, then close the configuration blade.
Step 3: Download and Configure the SAML Certificate
In Step 3 (SAML Certificates), download the Certificate (Base64) and save the .cer file.
Open the .cer file in a text editor (e.g. Notepad) and copy the full contents, including the BEGIN/END CERTIFICATE lines.
Paste this into the SAML Public Key field in Re-Leased's Manage Single Sign On settings.
Step 4: Finalise Setup
Under Step 4 (Set up Re-Leased), copy the Azure AD Login URL.
Paste this into the Sign-on URL field in Re-Leased's Manage Single Sign On settings and save.
Once complete, assign users or groups in Azure AD to the Re-Leased enterprise application to enable SSO for those users.


