This document describes the steps needed to setup Azure / WAAD as Identity Provider for SSO integration with CV Partner.
CV Partner supports SSO integration with WAAD using the SAML protocol. This document describes the configuration of the WAAD service, presuming the customer already has an Azure account with WAAD enabled.
1) Sign in to https://portal.azure.com/
2) Click on Azure Active Directory.
3) Click App registrations
4.1) Click “New application registration”
4.2) Give the application a name, select the supported account types and for the Redirect URI insert: https://<<yourcompany>>.cvpartner.com/auth/saml/callback
Replace <<yourcompany>> with the subdomain provided by your CV Partner technical contact.
5.1) After you have registered the application, go to
5.2) Click add a scope
5.3) Replace Application ID URI with https://<<yourcompany>>.cvpartner.com/auth/saml/callback (the exact same as for Redirect URI)
5.4) Give the scope a name and type in a consent display name and a description
6.1) Go to Authentication
6.2) Verify that the Reply URL is also the exact same (https://<<yourcompany>>.cvpartner.com/auth/saml/callback) :
7.1) Click on Overview
7.2) Click on Endpoints
7.3) Copy the URL to the Federation Metadata Document
7.4) Send the URL to firstname.lastname@example.org
When Azure / WAAD has been configured and CV Partner has received URL to the Federation Metadata Document, as well as activated the integration, the customer can verify that the integration works by accessing
The customer should be redirected to https://login.microsoftonline.com/ (or equivalent) and asked for authentication, before being redirected and logged into CV Partner. The customer might not be asked for authentication if inside the customer’s internal network. This is dependent on configuration. Both access from outside the customer’s internal network and outside should be tested and verified.
Please send any further inquires to email@example.com