Logon LabsBread and Butter

We’ve made some changes. Logonlabs.com is still here for you to view but, if you want the latest on our product please view the Bread & Butter IO website here:

How To Set Up Your Own Microsoft App (SAML)

Step 1

Log in to the your Azure Portal:


Step 2

Go to Azure Active Directory, and then go to Enterprise Applications.

Step 2

Step 3

Click New Application.

Step 3

Step 4

  • Add a Non Gallery Application
  • Give it a name
  • Click Add

Alternately, you can choose an existing SAML app from Microsoft.

Step 5

Go to the Single sign-on page, and select SAML.

Step 5

Step 6

On the Single sign-on page, click the edit button at the top right of the Basic SAML Configuration section

Step 6

Step 7

  • For Entity ID, enter anything you want. For example, you can enter your company name.
  • For Reply URL, enter:https://api.logonlabs.com/callback
  • If required, for the Sign on URL enter:https://api.logonlabs.com/callback
  • Click Save.
Step 7

Step 8

For the User Attributes & Claims section, ensure that at least the following are present:

  • emailaddress
  • givenname
  • surname
Step 8

Step 9

  • Download the Federation Metadata XML for the LogonLabs configuration below. Specifically, take note of the Login URL, Identifier (Entity ID) and X.509 Certificate.
  • Set a reminder for yourself to generate a new Certificate before it expires. If the Certificate expires, your users will no longer be able to log in with the provider.
Step 9

Step 10

LogonLabs Setup:

  1. Go to logonlabs.com
  2. Click Sign In and authenticate (or Sign Up make a new account and authenticate)
  3. Navigate to Providers, then to Default Rules (or Domain Rules and open/create a domain module).
  4. Click on the Microsoft button under Enterprise Identity Providers
  5. Choose SAML for the protocol.
  6. Enter a name.
  7. Enter a description (optional).
  8. Enter the Login URL from the setup page in Azure.
  9. In the Client ID field, enter the Identifier (Entity ID) that you set above.
  10. In the X.509 Certificate field, enter the X.509 certificate from the Federation Metadata XML document that you downloaded above. Do not include the BEGIN and END tags.
  11. Click Save & close.
  12. Enable Microsoft by clicking the new entry in the Microsoft Identity Providers list
Step 10