The following article will guide you on how to add an Azure AD identity provider. By doing that users in your organization will be able to access Caspio apps using credentials managed by Azure AD.

Before you begin: 

Sign into Azure Active Directory with admin rights and set up an Azure AD account. Your users can be authenticated to Caspio apps by creating a new enterprise application in Azure AD. 


  1. In Caspio directories, in the Identity providers tab, click Add identity provider.  

Links from the 1. Service provider information section will be needed later to configure the external identity provider. 


  1. In Microsoft Azure, click on the menu in the top left corner and select Azure Active Directory. 
  2. Under Manage Azure Active Directory, click View. 
  3. In the left menu, select Enterprise applications. 
  4. In the upper menu, click New application. 
  5. In the Browse Azure AD Gallery screen, select Create your own application.  
    1. Name your app. 
    2. Select Integrate any other application you don’t find in the gallery (Non-gallery). 
    3. Click Create.
  1. In the overview page of a newly created enterprise app, select the Set up single sign on tile.  
  2. Select SAML as the single sign on method. 
  3. In Azure AD, edit 1. Basic SAML Configuration and enter links from Caspio service provider information section according to the following table: 

Caspio → Service provider information

Azure AD → Basic SAML Configuration

Copy the Service provider identifier (Entity ID) URL... 

…and paste it into Identifier (Entity ID) field in Azure. 

Copy the Reply URL (Assertion consumer service URL)... …and paste it into the Reply URL (Assertion consumer service URL) field in Azure. 


  1. In the 2. Attributes and Claims section, perform the following actions:
    1. Edit Attributes & Claims and click Unique User Identifier (Name ID) 
    2. Select user.mail as Source attribute and click Save.

  1. In the 3. SAML Certificates section, download the Certificate (Base64). You will need this text in step 13c
  1. In Azure, open the Set up your application section. You will need it in step 13b.


  1. In Caspio directories, go to the identity provider you are adding and perform the following steps:
    1. Enter the name and select a user identifier in 2. Identity provider information. We recommend using the default Email field. If you use a different user identifier, please configure it also in the 2. Attributes and Claims section of Azure AD. 
    2. Provide the copied links from step 12 according to the following table: 

Azure AD Set up your app 

Caspio Identity provider information 

Copy the Login URL link... …and paste it into Single sign-on URL field in Caspio. 
Copy the Azure AD Identifier link... …and paste it into the Identity provider identifier field in Caspio. 

    1. In the SAML signing certificate (x.509), upload a certificate from step 11.
    2. Click Add and enable. 

Testing Azure AD Identity Provider Configuration: 

  1. Assign a user to an app in Azure ID: 
    1. In the left menu, select Users and groups. 
    2. In the upper menu, select Add user/group and open the list of all users and groups by clicking None selected. 
    3. Select a user from the list and click Select Assign 
    4. In the Add assignment screen, assign a user to an app. 
  1. Add a user in Caspio directories: 
    1. In the Users tab, create a user. 
    2. Fill in an email address of the testing user from Azure AD (step 1c of the testing procedure). User email in Azure AD and Caspio directory must match to authenticate a user. 
    3. Select sign-in method as per the identity provider name set up in step 6 above. 
  1. Sign in to the user portal with Azure AD:
    1. In Caspio directories, select User portal. 
    2. In the User portal URLs, click the Settings URL. 
    3. In the login page of a user portal, enter the email address of the newly created test user in Caspio directory. 
    4. In Azure AD login page, sign in with the Azure credentials. 
    5. You should be redirected to the Settings page of the user portal where you can see the profile information of the logged in user, including the email address.