Single Sign-On with Azure AD

This guide provides step-by-step instructions on setting up Azure AD as a SAML IdP for your Cloudsmith Organization.

Adding Cloudsmith to Azure AD

Cloudsmith is not (yet) an integrated application in Azure AD. You'll have to add Cloudsmith manually so you can configure SSO.

Step1

Log into the Azure portal as an admin and click Azure Active Directory in the left menu, then Enterprise Applications in the menu that appears:

1002
Step2

Choose + New application from the top menu:

1088
Step3

Click Non-gallery application and enter "Cloudsmith" in the "Name" box:

1934
Step4

Click the blue Add button at the bottom of the page. After a short processing delay, you'll be redirected to the overview page for your new application.

Step5

Select Single sign-on from the left menu and choose SAML:

2080
Step6

Next, we'll configure SAML settings. Click the pencil symbol beside Basic SAML Configuration to begin editing:

1542
Step7

To determine your Identifier and Reply URL (we use the same value for both) we use the following format: "https://cloudsmith.io/orgs/MY_ORG_NAME/saml/acs/", where "MY_ORG_NAME" is replaced with your organization's slug.

1560

Hit the Save button at the top of the page.

Step8

Next, we'll configure Azure to also send the user's first and last names during sign-in. Click the pencil icon on the User Attributes & Claims section:

1526
Step9

Remove all attributes except the Name identifier value, the screen should look as below:

2396
Step10

Next, we'll add first and last names to the attributes sent to Cloudsmith. Click + Add new claim at the top of the page, and add FirstName as follows:

1138
Step11

Repeat the process for LastName and hit Save. The attributes screen should now look as below:

1616
Step12

Finally, we'll need to add any users that need to be able to access the application. Click Users and groups in the left sidebar and then +Add user. You can add as many users or groups as needed:

1720

Providing configuration to Cloudsmith

Once configured as above, you'll need to provide metadata to Cloudsmith to connect to your newly configured IdP.

Go back to the Single sign-on tab in the sidebar, you should see, in section 3 (SAML Signing Certificate) a link that provides metadata for dynamic configuration, it is labelled App Federation Metadata Url.

Copy this link and add it to your SAML configuration in your Cloudsmith organization settings

678

All wrapped up!

Once you've added the link to your App Federation Metadata, and enabled SAML in your Cloudsmith organization settings, you will be able to access the landing page of your organization at the following URL:

https://cloudsmith.io/orgs/ORG/saml/login/

Where ORG is your organization's slug/identifier (what you would normally see in the URL when accessing your organization within Cloudsmith). If you're not sure what this is, please just ask us.

If you have any feedback on our SAML functionality or features you wish we supported, please do let us know as it'll help inform our roadmap in future.


Cloudsmith is the new standard in Package / Artifact Management and Software Distribution

With support for all major package formats, you can trust us to manage your software supply chain.


Start My Free Trial Now
Cookie Declaration (Manage Cookies)