Microsoft Entra ID is the new name for Azure AD. The names Azure Active Directory, Azure AD, and AAD are replaced with Microsoft Entra ID.
Set up steps
- Log in to your Entra admin portal.
- Browse to Identity > Applications > Enterprise applications.
- Select New application and then Create your own application.
- Enter the name "StoryBox Hub" and choose "Integrate any other application you don’t find in the gallery" then click Create.
- In the Overview page, select Set up Single Sign-On and then SAML.
- Select Edit in Basic SAML Configuration.
- In a separate browser tab or window, log in to your StoryBox Account Settings as the Account Holder.
- Still in StoryBox Hub, scroll down to Other Account Actions on the right hand side and click Configure SSO details.
- For Identity provider choose "Microsoft Entra ID (Azure)".
- Type some dummy text into the following fields, we'll come back to edit them properly later (we’re looking into changing how this works). For example:
- IdP Entity ID or Issuer: tbc
- SAML Login URL: https://storyboxhub.com
- X.509 Certificate: tbc
- User name attribute: tbc
- Click the Update button at the bottom of the page.
- This will generate a new section called Metadata to configure the IDP. Save these values into the Basic SAML Configuration section back in Entra:
- Copy the SP-EntityID / Issuer URL and paste it into the Identifier (Entity ID) field in Entra. It usually starts with https://auth.storyboxhub.com/saml2/ and ends with /metadata
- Copy the ACS (AssertionConsumer Service) URL/Issuer URL and paste it into the Reply URL (Assertion Consumer Service URL) field in Entra. It usually starts with https://auth.storyboxhub.com/saml2/ and ends with /acs
- Click Save.
- Still in the Entra admin portal, click Edit in the Attributes & Claims section.
- If you don't see any Claim name URLs, you might have to add them first. When you've done this, copy the Claim name URLs in Entra into the Attribute Mapping section in your StoryBox Hub SSO settings. The defaults are usually as follows:
- In the Entra admin portal, look for the SAML Certificates section. Download the Certificate (Base64) file, open it, and copy its contents into the X.509 Certificate field in StoryBox Hub.
- In the Entra admin portal, look for the Set up SAML App section. Copy these values into the Configure Service Provider section in your StoryBox Hub SSO settings:
- Copy the Login URL and paste it into SAML Login URL field in StoryBox Hub. This usually starts with https://login.microsoftonline.com/ and ends with /saml2 (no slash at the very end).
- Copy the Microsoft Entra / Azure AD Identifier URL and paste it into the IdP Entity ID or Issuer field in StoryBox Hub. This usually starts with https://sts.windows.net/ and ends with a slash / at the end.
- In your StoryBox Hub SSO settings, click the Update button. You should now be ready to test the connection.
Testing steps
- Log out of your StoryBox Hub Account Holder settings.
- While still on the StoryBox Hub homepage, click the LOG IN button in the top right corner.
- Click SSO.
- Find your Organisation Name in the dropdown box. (You can edit the name that shows here in your Account Holder settings.)
- Click LOG IN.
- Submit user credentials for your organisation.
- You should be redirected back to StoryBox Hub and be logged in when the page loads. If you've mapped the attributes correctly and you included a First Name attribute, you should see the first name of the user you logged in as in the top right hand corner.
Direct login page link
If you can log in successfully, you can use this URL format as a direct link to your organisation's StoryBox Hub login page:
https://storyboxhub.com/login?sso_id=XXXX
Replace XXXX with the same number you see in your StoryBox Hub Entity ID and ASC URLs.
If a user visits that page and they’re already logged in to Entra in the same browser session, they should be logged straight in to StoryBox Hub after clicking the LOG IN button.
Troubleshooting
If you follow the steps above and experience any issues, please contact our support team with these details:
- Your identity provider's name
- Screenshots of your SAML configuration from your IdP’s admin portal
- Screenshots of any error messages
- A set of test user credentials