Asset Intelligence and Management

Asset Intelligence and Management

EZRentOut Blogs Azure Ad Single Sign On Sso Integration With Ezrentout

[How-to] Configure Azure AD Single Sign-on (SSO) Integration With EZRentOut

Share this article:

In this article, we’ll guide you on how to integrate EZRentOut with Azure Active Directory (AD). When you integrate EZRentOut with Azure AD, you can:

  • Control in Azure AD who has access to EZRentOut.
  • Enable your users to be automatically signed in to EZRentOut with their Azure AD accounts.
  • Manage your accounts in one central location i.e. the Azure portal.

To learn more about Single Sign-on with Azure AD, click here.

1. Prerequisites

To get started, you need the following items:

  • An Azure AD subscription. If you don’t have a subscription, you can get a free account.

EZRentOut single sign-on (SSO) enabled subscription.

2. Scenario description

In this tutorial, you configure and test Azure AD SSO in a test environment.

  • EZRentOut supports Service Provider-initiated SSO.
  • EZRentOut supports Just In Time user provisioning.

Note: The identifier of this application is a fixed string value so only one instance can be configured in one tenant.

3. Adding EZRentOut from the gallery

To configure the integration of EZRentOut into Azure AD, you need to add EZRentOut from the gallery to your list of managed SaaS apps.

  1. Sign in to the Azure portal using either a work or school account, or a personal Microsoft account.
  1. On the main portal, click the Azure Active Directory service icon
  1. On the left navigation pane, navigate to Enterprise Applications 
  1. Then, select All Applications.
  1. To add a new application, select New application
  1. In the Browse Azure AD Gallery section, type EZRentOut in the search box.
  1. Select EZRentOut from the results panel and then add the app by hitting ‘Create’.

Wait a few seconds while the app is added to your tenant.

4. Configure and test Azure AD single sign-on for EZRentOut

Configure and test Azure AD SSO with EZRentOut using a test user called B.Simon. For SSO to work, you need to establish a link relationship between an Azure AD user and the related user in EZRentOut.

To configure and test Azure AD SSO with EZRentOut, perform the following steps:

  1. Configure Azure AD SSO – to enable your users to use this feature.
    1. Create an Azure AD test user – to test Azure AD single sign-on with B.Simon.
    2. Assign the Azure AD test user – to enable B. Simon to use Azure AD single sign-on.
  2. Configure EZRentOut SSO – to configure the single sign-on settings on the application side.
    1. Create an EZRentOut test user – to have a counterpart of B.Simon in EZRentOut which is linked to the Azure AD representation of the user.
  3. Test SSO – to verify whether the configuration works.

5. Configure Azure AD SSO

Follow these steps to enable Azure AD SSO in the Azure portal.

  1. In the Azure portal, on the EZRentOut application integration page, find the Manage section and select single sign-on.
  1. On the Select a single sign-on method page, select SAML.
  1. On the Set up single sign-on with SAML page, click the ‘Edit’ icon for Basic SAML Configuration to edit the settings.
  1. On the Basic SAML Configuration section, enter the values for the following fields:

5.1. For Service Provider Initiated configuration:

Type the following in these data fields:

  • Identifier (Entity ID):
  • Reply URL (Assertion Consumer Service URL): https://<SUBDOMAIN>.ezrentout/users/auth/saml/callback
  • Sign-on URL: https://<SUBDOMAIN>.ezrentout/users/sign_in

Note: Replace the “subdomain” text with the subdomain in your company’s EZRentOut account URL. You can also contact the EZRentOut team at for this value. Refer to the patterns displayed in the Basic SAML Configuration section in the Azure portal for additional fields.

5.2. For IDP Initiated configuration:

In order to sign in directly upon initiating from the IdP (Azure AD). We need to change the sign-on URL in Azure AD to “https://<SUBDOMAIN>”.

  1. EZRentOut application expects the SAML assertions in a specific format, which requires you to add custom attribute mappings to your SAML token attributes configuration. The following screenshot shows the list of default attributes.

Copy the claim name URLs for user.givenname, user.surname, and user.mail and paste them onto the Attributes fields required in Step 5 of Section 6.3.

  1. In addition to the above, the EZRentOut application expects a few more attributes to be passed back in the SAML response. These attributes are also pre-populated but you can review them as per your requirements.
  2. On the Set up single sign-on with SAML page, in the SAML Signing Certificate section, click on ‘Add Certificate’, find Certificate (Base64), select ‘Download’ to download the certificate, and save it on your computer for Step 2 of Section 6.3.

  1. On the ‘Set up EZRentOut’ section, copy the Login URL for Step 1 of Section 6.3.

5.1.1. Create an Azure AD test user

In this section, you’ll create a test user called Ray Holt in the Azure portal.

  1. From the left pane in the Azure portal, select Azure Active Directory, select Users, and then select All users.

  1. Select ‘New user’ at the top of the screen and select ‘Create New User’

  1. In the User properties, follow these steps:
  • In the Name field, enter ‘Mark Twin’.
  • In the User name field, enter the username@companydomain.extension. For example, ‘’.

  • Select the Show password check box, and then write down the value that’s displayed in the Password box.

  • Click ‘Create’.

5.2.2. Assign the Azure AD test user

In this section, you’ll enable Mark Twin to use Azure single sign-on by granting access to EZRentOut.

  1. In the Azure portal, select Enterprise Applications, and then select All applications.
  2. In the applications list, select EZRentOut.
  3. In the app’s overview page, find the Manage section and select Users and groups.

  1. Select ‘Add User’, then select Users and groups in the Add Assignment dialog.

  1. In the Users and groups dialog, select Mark Twin from the Users list, then click the ‘Select’ button at the bottom of the screen.
  2. If you’re expecting any role value in the SAML assertion, in the Select Role dialog, select the appropriate role for the user from the list and then click the Select button at the bottom of the screen.
  3. In the Add Assignment dialog, click the ‘Assign’ button.

6. Configure EZRentOut SSO

Once you have set up the EZRentOut app on your preferred SAML identity provider i.e. Azure AD in this instance, configure the settings in EZRentOut from Settings → Add Ons → SAML Integration.

6.1. Whitelisting the IPs on SAML

Some identity providers require IPs to be whitelisted. Make sure that the following two IPs are whitelisted in your SAML settings:


6.2. Add EZRentOut consumer service URL to your SAML Settings in Azure AD

The EZRentOut consumer service URL can be obtained from Settings → Add Ons → SAML Integration:

https://<Your Company Subdomain>

Copy and paste the EZRentOut consumer service URL in the Reply URL field from Step 4 of Section 5.1.

6.3. Fill in the configuration settings

The following information needs to be configured in your EZRentOut’s account (see image below to identify the fields):

  1. Unique Identity Provider URL: Find and copy your Login URL from Step 8 of Section 5.1 (see the image below). You will be required to paste this link in the ‘Identity Provider URL’ field while configuring EZRentOut for SAML Integration.
  1. Identity Provider Certificate: Unique for every Account Owner, this certificate is provided by the identity provider. Copy the text from Certificate (Base64) that you downloaded and saved from Step 7 of Section 5.1. (see image below).

EZRentOut will use the certificate to validate the response from your identity provider letting the user to login in using SAML.

Note: Make sure to follow the below format for the certificate when pasting it in the certificate field so EZRentOut validates your identity provider’s certificate without any error. It’s as follows:


your certificate details here


  1. Login Button Text: By default, it’s labeled as ‘Access through SAML SSO’. You can rename it to any text preferable to you e.g. Access using Mark Twin Corp Login.
  2. Clock Drift: A delay of a few seconds in situations when different time zones are involved to ensure that the response generated by a server remains valid.
  3. Attributes required for SAML configuration: Last Name and Email attributes need to be present for EZRentOut. These attributes/parameters should be sent over to EZRentOut from your identity provider. In Azure AD, you can copy these parameters from Step 5 and 6 of Section 5.1. Map these parameters in EZRentOut. If your Last Name attribute in SAML is last_name, then fill in ‘last_name’ against the Last Name field. The same goes for the Email.
  4. EZRentOut Role by default: This option lets you add users as either Administrators or Staff Users.

Scroll to the top of the Add Ons page in EZRentOut settings, and click ‘Update’. You now have a SAML-enabled EZRentOut account.

This is how your SAML configuration settings should look like:

6.4. Create EZRentOut test user

In this section, a user called Ray Holt is created in EZRentOut. EZRentOut supports just-in-time user provisioning, which is enabled by default. There is no action item for you in this section. If a user doesn’t already exist in EZRentOut, a new one is created after authentication.

7. Test SSO

In this section, you test your Azure AD single sign-on configuration using the Access Panel.

When you click the EZRentOut tile in the Access Panel, you should be automatically signed in to theEZRentOut for which you set up SSO. For more information about the Access Panel, see Introduction to the Access Panel.

8. Troubleshooting

This section highlights a common issue that you may come across while configuring the SAML integration with Azure AD, and ways to fix it.

Problem: I managed to configure the SAML integration with Azure AD, but I can’t seem to log into the EZRentOut portal.

Solution: If you have configured SAML 2.0 in Azure AD but failed to log into EZRentOut, it may be because your Attributes have not been configured correctly. These Attributes are used to verify the existence of user accounts on both platforms — Azure AD and EZRentOut — and should be identical in both applications.

In case of a discrepancy, you won’t be able to log in and will receive an email from our support team. This email lists the values we receive from the SAML payload of your server in the form of a table and highlights the Attribute(s) that have been incorrectly figured. You need the correct Attribute for each corresponding Value (such as Email, Last Name, and First Name).

For instance, in the image below, we have highlighted the incorrectly configured Attribute corresponding to the ‘Email’ value.

The email also shows the incorrectly configured attribute value as it appears in EZRentOut and flags it with “ATTRIBUTE NOT FOUND” so you can re-enter the correct value in EZRentOut SAML settings.

As you can see, the configured Attribute for Email is different in both images, resulting in the login failure.

To fix this, copy and paste the Claim Name URL for Email (see image below) from your Azure AD account into EZRentOut’s section for SAML integration and hit ‘Update’. You can now successfully log into EZRentOut using your Azure AD email.

Please note that for the integration to work correctly, you MUST enter all Attribute values in EZRentOut exactly as they appear in Azure AD.

About EZRentOut

EZRentOut, a cloud-based equipment rental software can help. EZRentOut offers companies in numerous industries seamless rental management along with a host of other features. You can integrate your website with our EZR plug to keep track of all your rental Assets and operations.

Was this helpful?

Thanks for your feedback!

Trusted by 700+ Rental Businesses
Everything Your Rental Business Needs


Personalized Demo For You

Please share your details below & let our Product Specialist get back to you