1. Docs
  2. Pulumi Cloud
  3. Access management
  4. SAML(SSO)
  5. Azure AD

SAML: Configuring Azure Active Directory

    This guide walks you through configuring your Azure Active Directory (Azure AD) as a SAML SSO identity provider (IDP) for the Pulumi Cloud.


    Configuring Azure AD

    Add an application to your Azure AD tenant

    1. In the Azure portal, on the left navigation panel, select Azure Active Directory.

    2. Select Enterprise applications. It will show some of the existing applications in your Azure AD tenant.

      Enterprise applications section

    3. Select New application.

      New application

    4. Select Non-gallery application tile and in the Add your own application panel, enter Pulumi Cloud as the application name then select Add.

      Non-gallery application

    5. In the new Pulumi Cloud application, navigate to the Single sign-on section, and select SAML.

      Single sign-on settings

    6. Select the Edit icon on the Basic SAML Configuration panel.

      SAML configuration

    Enter Pulumi configuration into your Azure AD application

    The values you need to use are dependent upon your Pulumi organization name. Be sure to replace acmecorp with your actual organization name.

    SAML SettingValue
    Identifier (Entity ID)https://api.pulumi.com/login/<acmecorp>/sso/saml/metadata
    Reply URLhttps://api.pulumi.com/login/<acmecorp>/sso/saml/acs
    Relay Statehttps://api.pulumi.com/login/<acmecorp>/sso

    Edited SAML configuration

    Configure the name identifier format

    1. Select the Edit icon on the User Attributes & Claims panel.

      User Attributes & Claims Panel

    2. Then, select the Edit icon next to Name identifier value.

      User Attributes & Claims

    3. In the Manage User Claims panel, expand Choose name identifier format and select Email address.

      Manage Name Identifier Format

    4. Finally, select Save at the bottom of the Manage User Claims panel.

    Important: Do not change the value of Name ID Format value once your users have started using Pulumi—not even switching its value between Email or Persistent.
    Note: Be sure to assign users and groups to use your new Pulumi Cloud SAML application. That is how you can control membership access to your Pulumi organization. See the Azure AD documentation for more information.

    Now that the Azure AD-side of the SAML SSO configuration is complete, you will need to configure the Pulumi Cloud to receive SAML SSO requests from your Azure AD.

    Configuring Your Pulumi Organization

    To configure your Pulumi organization to accept SAML SSO requests from Azure AD, you will need to download the SAML application’s configuration data and then pass that to Pulumi.

    1. Back on the Azure AD’s application settings page, select the SAML Signing Certificate panel. Then select Download next to Federated Metadata XML and save the resulting file.

      Download XML

    2. Sign into the Pulumi Cloud and navigate to your SAML organization. Navigate to the Settings tab and then select Access Management.

    3. Select the Change Requirements button and then SAML SSO.

    4. Open up the XML document you downloaded from the Azure AD portal, and paste its full contents into the Identity Provider Metadata field.

      Provide the XML IDP descriptor

    5. Select Save.

    Signing into Pulumi using Azure AD

    Once your Azure AD application is created, and its configuration data passed to Pulumi, you can now sign in to the Pulumi Cloud using your SAML SSO credentials.

    Navigate to https://app.pulumi.com/signin/sso/ and enter the name of your Pulumi organization. If everything is configured correctly, you should be prompted to sign in to your Azure AD instance, and then immediately be redirected back to the Pulumi Cloud.

    Pulumi Cloud


    If you have any trouble configuring Azure AD, signing into Pulumi, or need additional assistance, please contact support.

      Introducing Pulumi Copilot - Intelligent Cloud Management