Azure Single Sign-On Integration With Qualaroo


Microsoft Azure SSO integration with Qualaroo helps you maintain a neat record of all your responses in a dedicated directory.


By integrating Azure SSO with Qualaroo, you can:


1. Leverage the next-gen cloud technology of Microsoft Azure

2. Extract valuable insights from your Qualaroo responses hassle-free


Here’s how you can integrate Microsoft Azure SSO with Qualaroo:


Step 1: Log In


Log in to your Azure account (Use the same ID you used to register with Qualaroo).


Signing in to your Microsoft Azure account


Step 2: Azure Active Directory


  • Search for the active directory and click on it.

  • Navigate to ‘Enterprise Applications’ under ‘Manage’ on the left panel.


Enterprise Applications


Step 3: Create App


  • Click on ‘New application’ to add a new enterprise application.


Creating a new enterprise application


Step 4: Browse Azure Ad Gallery


In the Browse ad gallery,


  • Search for ‘Qualaroo’ and click on the Qualaroo application.

Searching Qualaroo in the Azure AD Gallery


  • Create the application using a SAML-based single sign-on.

(This is only for the production part. It won’t work on staging.)


SAML-based Single Sing-on


Step 5: Choose SAML-based Single Sign-On


It will take a few seconds to create the application, and then you will be redirected to the page where you have to choose in which mode you want to move forward with the single sign-on.


For our application, we will be using a SAML-based single sign-on.


Setting up Single Sign-on


  • Click on the tab to set up Single Sign-on.

  • Choose the SAML tab, which provides secure authentication to the application using the SAML(Security Assertion Markup Language) protocol.


SAML-based Single Sign-on


Now, we will configure the SAML-based Single sign-on.


Step 6: Configure SAML


You can configure the SAML by filling up the required data.


Downloading the Federation Metadata XML file


  • Check whether the SAML Signing Certificate is active or not. You can activate it by editing the required details.

  • In the basic configuration, Identifier(Entity ID) should be unique, and ACS URL should be the path to redirect and save the data.

  • The essential part is that you have to download the Federation Metadata XML file.


Note: You can provide the Federation Metadata XML file to the Qualaroo support team if you face any problem signing in to the Qualaroo account after configuration.


Step 7: Add Users and Groups


Before testing the application, you need to add yourself as a user to access the application.


You can find ‘Users and groups’ under the ‘Manage’ section.


Users and groups


  • Add a new user or new group. You can even invite people.

  • If you don't want to provide access to a particular person, then simply delete the user to deny them access.


Adding user/group


Step 8: Test the Application


Now you can test the application for the following configuration while clicking on the test application link or the ‘Test’ button.


Test single sign-on with Qualaroo




Testing the SSO feature


Now test the application by clicking on Sign in as the current user. If it redirects to the correct path, your Single Sign-on is ready to use and working fine.

Step 9: Provide the Credentials


After clicking on the test button or link, please sign in as a current user so that you can test the application.


If it redirects to the correct path as configured, then it works fine.


Signing in as current user


If it redirects to the Qualaroo dashboard and is logged in, your SSO configuration works fine.


Qualaroo dashboard preview


Are You Facing a Problem with Signing into the Qualaroo Account After Configuration?


If you face difficulty while signing in to the Qualaroo account or if your error shows something like this


Qualaroo Sign-in error

Please contact the Qualaroo support team and provide them with the Federation Metadata XML file.



© 2005 - 2024 ProProfs