Azure SAML is the same as all other SAMl providers, just a little different UI configuration.  Use the screenshots below to help guide you.\\
\\
1.) Create a new application.\\
[attachments|1_new_application.png]\\
\\
\\
2.) Create your own, we don't have a template to choose from.\\
[attachments|2_create_your_own.png]\\
\\
\\
3.) On the left choose Single Sign On to configure the SSO part of the SAML.\\
[attachments|3_properties.png]\\
\\
\\
4.) Choose SAML.\\
[attachments|4_sso_saml.png]\\
\\
\\
5.) Edit.\\
[attachments|5_edit.png]\\
\\
\\
6.) Configure the URL's for your CrushFTP server.  The top one will be the 'SAML Issuer' configuration on the SAMLSSO CrushFTP plugin config.\\
[attachments|6_config.png]\\
\\
7.) Download the metadata XML from the site after saving in step 6.  Edit with a text editor.\\
[attachments|saml_metadata_XML.png]\\
\\
7.1.) Navigate to CrushFTP SAMLSSO plugin configure it based on Azure's Single sign-on (see screenshot too):\\
{{{
[CrushFTP settings]                                 [Azure Settings]
SAML Provider URL (EntityID)       ->             Azure AD Identifier
SAML Audience                      ->             Identifier (Entity ID)
IDP Redirect URL (HTTP-POST)       ->             Login URL
SAML Issuer                        ->             Identifier (Entity ID)
}}}\\
\\
[attachments|plugin_azure_setting_macth.png]\\
\\
7.2.) On CrushFTP SAMLSSO plugin for "_Authentication type:_" set "urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport".
{{{
Authentication type:urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport
}}}

7.3.) In the middle of the XML is the X509 base64 encoded certificate info.  Copy it and paste into the BAS64 encoded PEM certificate in SAMLSSO plugin in CrushFTP.\\
\\