How to Configure SAML SSO on Omada Controller

Centro de Recursos
Guía de Configuración
04-09-2025
19641

Contents

Introduction

Requirements

Configuration

Verification

Conclusion

QA

Introduction

SAML SSO is an XML-based open standard for exchanging authentication and authorization data between parties, specifically between an identity provider (IdP) and a service provider (SP). It enables users to log in once and access multiple systems without needing to log in again at each one.

This article explains how to configure SAML SSO, using Microsoft Entra and the Omada Network System v6.1.0.100 as an example.

Requirements

  • Omada Standard Cloud-Based Controller/Omada Software Controller/OC300/OC400
  • Microsoft Entra/Microsoft Azure

Configuration

The following steps will cover the configuration of the identity provider.

Step 1. Create a new application on the Microsoft Entra.

Go to Microsoft Entra Admin Center: Microsoft Entra admin center. Click Enterprise apps.

Show the position of Enterprise apps.

Click New application to browse the Microsoft Entra APP Gallery.

Show the position of new application.

Click Create your own application. Enter the name of the application and click Create.

Show the way to create a new application.

Step 2. Initialize single sign on and obtain the identity provider metadata file.

Choose 2. Set up a single sign-on.

Show the position of 2. Set up single sign on.

Click Edit in Basic SAML Configuration to configure Identifier and Reply URL.

Show the way to configure the identifier and reply URL.

Here, we input https://www.omadanetworks.com as the value of both Identifier and Reply URL. In fact, we can temporarily place any URLs we like here, as we will reconfigure them later.

Show an example to configure the identifier and reply URL.

Go to SAML Certificate > Federation Metadata XML and click Download to download the IdP metadata file.

Show how to download the IdP metadata file.

Step 3. Create a new SAML connection and a new SAML user group on the Omada Controller.

Go to the Controller to configure the SP system. Go to Global View > Settings > SAML SSO, then click Add New SAML Connection.

Show the entrance to add a new SAML connection.

Input an Identity Provider Name, upload the Metadata.xml file we just downloaded, and click Apply.

Show how to add a new SAML connection.

Check the Details of the entry we just created. Here we can see the Entity ID, Sign-On URL, Omada ID, and Resource ID.

Show the details of the entry we just created.

Click the download button to get the metadata.xml file.

Show the position of the download button.

Click Go To SAML User Group.

Show the entrance of the interface of SAML User Group.

Click Add New SAML User Group.

Show the entrance to add a new SAML User Group.

Set the SAML User Group Name, the related role and privileges, then click Create.

Show how to add a new SAML User Group.

Step 4. Continue configuring single sign-on on the Microsoft Entra.

On Entra's homepage, click Enterprise apps. Click the application we created before.

Go back to the Microsoft Entra application to continue configuring.

Then go to 2. Set up single sign on.

Show the position of 2. Set up single sign on.

Click Upload metadata file to upload the metadata.xml file we got in step 3.

Show the position of “upload metadata file”.

Refer to the picture below and fill in the other basic SAML configurations.

Show an example of basic SAML configuration.

  • Identifier (Entity ID): The same as the Entity ID we saw in the Controller’s SAML Attributes.

Check Entity from Controller’s SAML Attributes.

  • Reply URL (Assertion Consumer Service URL): The same as the Sign-On URL we saw in the Controller’s SAML Attributes.

Check Sign-On URL from Controller’s SAML Attributes.

  • Sign On URL(Optional): This text bar should be blank. Please don’t confuse this with the Sign-On URL we saw in the Controller’s SAML Attributes.
  • For Relay State, we must encode the string “resourceId_omadaId” using Base64. We can use any open-source Base64 encryption tool to encrypt this script.

Check Omada ID and Resource ID from Controller’s SAML Attributes.

For example:

Show an example of encoding the string with Base 64.

Step 5. Create a new app role.

Go back to App registrations > All applications and click the application we created before to continue configuring.

Go back to the Microsoft Entra application to continue configuring.

Go to App roles and click Create app role.

Show the entrance to create new app roles.

Configure both the Display name and Value to be the same as the SAML User Group Name we configured on the Controller in Step 3. Select the types as Users/Groups and input some necessary descriptions. Then click Apply.

Show how to create a new app role.

Step 6. Assign the role to specific users.

Go back to Enterprise App on Entra's homepage, click the application we created before.

Go back to the Microsoft Entra application to continue configuring.

Go to Users and Groups and click Add user/group.

Show the entrance to add a new user.

Click the first None Selected and select the users we are going to assign the role, then click Select.

Show an example to select a user.

Click the second None Selected and select the role we created before, then click Select.

Show an example to select the role.

Then click Assign.

Show the position of the button to assign the setting.

We have now completed the role assignment.

Show the result of role assignment.

Step 7. Continue configuring single sign-on on Entra.

Go back to Enterprise App on Entra's homepage, click the application we created before.

Go back to the Microsoft Entra application to continue configuring.

Go to 2. Set up single sign on.

Show the position of 2. Set up single sign on.

Click Edit in Part 2— Attributes & Claims to edit the attributes.

Show the position of the edit button.

Click Add new claim.

Show the entrance to add new claims.

Add the username as a parameter. Set Name as username and the Source Attribute as the user.displayname.

Add the Attribute username, and parameters should be input as the sample.

Add the usergroup_name as a parameter. Set Name as usergroup_name and the Source Attribute as user.assignedroles.

Add the attribute usergroup_name, and parameters should be input as the sample.

Verification

Method 1: Go to the interface of SAML-based Sign-on settings and click Test sign in to test.

Show the position of the test button.

And then the browser should redirect us to the Omada Controller and log in.

Method 2: Go to https://myapplications.microsoft.com. After logging in with our Microsoft ID, click the Application we just configured to log in to Omada Controller.

Click the Application to log in to the Controller directly.

Then the browser should redirect us to the Omada Controller.

Conclusion

We have successfully configured the SAML SSO of Omada Controller with Microsoft Entra/Azure ID.

Get to know more details of each function and configuration please go to Download Center to download the manual of your product.

QA

Q1: What should we do if the browser reports a While Label Error Page? After checking the dev tools windows, there’s also the error code “405 Method Not Allowed.”

Redirection with SAML SSO failed, and the error code shows “405 Method Not Allowed”.

A1: From the dev tools, we can see that the Allow method for Response Headers is POST, but generally, the Request Method is GET. The technique is not matched.

Go back to the application's Basic SAML Configuration, choose Edit to configure the configuration, double-check the Identifier, Reply URL, and Relay State, and remember to keep Sign On URL blank.

Return to the Basic SAML Configuration and double-check the input parameters; the Sign URL(Optional) must be blank.

Q2: What should I do if I meet the error code {"errorCode":-1001, "msg": "Invalid request parameters."} ?

A2: Go back to the interface of Attributes & Claims to check whether we have set the username and usergroup_name correctly.

Go back to the interface of Attributes & Claims to check whether we have set the username and usergroup_name correctly.

Q3: What should I do if I meet the error code {"errorCode":-1, "msg": "Something went wrong. Please try again later or contact our technical support."} ?

A3: Go back to SAML Certificates. If we have more than one certificate, please delete the manually added ones.

Clear the other certificates and only keep the default one.

Evalúa este documento

Documentos relacionados