Azure AD for Status Pages

With FireHydrant's status pages, you can lock them behind your SSO provider so that only employees or other organization members can access them.



We currently only support SAML 2.0 for SSO-authenticated status pages. In addition, this limits access to anyone in your organization who can login via SSO, not only users with FireHydrant licenses.


  • You'll first want to set up and configure a status page. Once the page is created and accessible, you can start working through these instructions to lock it behind authentication.

Azure Active Directory SAML

1. Create SAML app

  1. While signed in to Azure Active directory, go to Application > Enterprise Applications.
  2. Click New Application at the top.
  3. Click Create your own application.
  4. Set a name for your app (we recommend Internal Status Page) and select Integrate any other application you don’t find in the gallery (Non-gallery) and click Create.
Azure AD gallery

Azure AD gallery

2. SAML Configuration

  1. Once the app is created, go to Single Sign-On and select SAML.
  2. Click Edit for Basic SAML Configuration and enter your information using the table below as a reference, where is the custom domain for your status page.
Entity IDhttps://<custom domain>/auth/dex/callback
Reply URLhttps://<custom domain>/auth/dex/callback
Sign on URLhttps://<custom domain>

You will need this file in a later step.

Example SAML configuration in Azure

Example SAML configuration in Azure

  1. Under Attributes & Claims, ensure you have at least one claim mapped to a value representing the user’s email address. This is how authenticated users will be identified.

    • In this example, we have emailaddress mapped to the user.userprincipalname property since that is how this tenant stores email addresses:
    Attributes and Claims example

    Attributes and Claims example

3. Submit metadata to FireHydrant

Under SAML Certificates, download the Federation Metadata XML file and upload it when opening a support ticket with FireHydrant.

Your support representative will complete the setup with you from there.

4. Verify

Once FireHydrant has configured and finished the setup, attempting to access an SSO-locked status page should redirect you to your organization's SSO sign-on page.

Next Steps