This article has been updated to match the new Azure admin portal – ENJOY!

Workspace One UEM allows for a whole number of different ways to authenticate when enrolling new devices. The majority of organisations will always choose to integrate with their on-premise AD through the use of the Could Connector, this component allows for user group sync, integration to on premise certificate authorities and to pull user attributes from Active Directory. All these features allow for a very stream lined enrollment and the ability to integrate with a whole number of different corporate resources.


For a lot of new organisations, that may not already have a large on-premise foot print, cloud directories are far more favourable. They’ll skip the need and high cost for internal equipment when they can easily spin up new tenants on whatever identity/directory service they choose.

An ever increasing solution is Azure Active Directory online only, with no on-premise directory sync (though Azure AD Connect). Leveraging this cloud directory type, allows users to authenticate into Workspace One UEM using SAML, this creates the user within the console and allows the user to enroll their devices.

Setting this up can be complicated and detailed instructions can be hard to find. Don’t worry, the EUCSE’s got your back!

Add Azure Application:

1 .Go to the Azure portal by clicking the following link:

2. Once logged in, select “Azure Active Directory” on the left-hand side of the portal

3. Select the Enterprise Applications section in the panel on the left and then select the “+New Application” button at the top.

4. Select ‘Non Gallery Application’ and give it a name. This will enable you to setup the SAML integration.

5. Select ‘Add’ – Be patient, this can take a few seconds. The bell icon in the top bar will display whats happening with the app. You’ll then automatically be re-directed to the app configuration screen when it’s completed.

Configure Azure Application

  1. You should then see the above display. An overview of the new app.
  2. Now click on point 2. ‘Set up single sign on’
  3. You’ll then be asked what method of single sign on you require.

4. Select SAML and you’ll be shown the following screen.

5. Scroll down to point 3 and hit download on ‘Federation Metadata XML’ – We’ll now need to upload this into Workspace ONE UEM.

Workspace One UEM Configuration

  1. Open your console, go to Groups & Settings -> All Settings -> System -> Enterprise Integration -> Directory Services
  2. Change “Directory Type” to “none” and save the page at the bottom.
  3. Scroll back up and enable “Use SAML for Authentication”
  4. Enable “Use new SAML Authentication Endpoint”
  5. Under SAML 2.0 you can upload the XML you just saved from the Azure App and select Upload next to Import Identity Provider Settings

6. Now scroll to the bottom and save. The imported XML settings will be applied only after saving the Directory Services page. The Identity Provider ID and the SAML information should now be populated from the federation XML you just uploaded.

Directory Services Configuration 

1 – Now scroll down and make sure that the request binding and response are both set to ‘Post’ and hit save.

2-Previously we would have needed to manually add the assertion URLs into Azure but we can do this automatigically now! Scroll down to the bottom of the directory page in UEM and click’Export Service Provider Settings’ – We’ll use this shortly to finish the Azure App configuration.

3. Now we need to update the user attribute section. Select the User tab at the top and change the user attributes and Base DN as seen in the screenshot below:

Final Azure App Configuration

1-Make sure you’re on the ‘Single Sign-on’ page of your app and click on ‘Upload metadata file’

2- This should essentially complete the final section of your Azure app. Uploading the metadata should fill all the response URL’s required.

SAML Authentication Test

  1. Get a hold of any device type
  2. Download the Workspace One Intelligent Hub application
  3. Select Server Details on the Agent page (if you have AutoDiscovery you can select email instead)
  4. Enter your environment URL along with your group id where you configured Azure SAML Authentication.
  5. You should now be re-directed to the Azure logon page. Once here enter in the credentials for a user in Azure.

You can also test this from a computer by navigating to:

You should then be forwarded to a Microsoft login page

Spread the love