Questions about using third party IdP to authenticate to Office 365

Copper Contributor

I am setting up Google as the identity provider, and no issues with the setup, its working fine, but i have a few questions-:


1. I used Global Admin role to setup SSO, but i want to delegate future domains federation without giving global admin role, so i want to know which Office 365 role (instead of Global admin) or permission is allowed to setup federation? 

2. I understand Office 365 users immutableId will be the base64 version of AD objectGUID if we use directorySync, but what if we do not use directory sync (cloud only), what would be the immutableId in that case, will it be user's primary email id?

3. What does Office 365 need from IdP in the nameId of SAML to identify and authenticate the user, is it immutableId or UPN or user's primary email address?

4. I have put logoutUri when setting up federation via Powershell (e.g $LogOffUri = “
https://mywebsite.com”) but it does not take user there when logging out, rather logs out at office 365 home page.

 

Thank you so much in advance for sharing your insights.

1 Reply
For question #1, it appears Global Admin is required, as I don't see a separate role available for configuring federation according to this article here:
https://docs.microsoft.com/en-us/azure/active-directory/manage-apps/plan-sso-deployment#required-adm...

For question #2, the UserPrincipalName is the unique identifer when it is a cloud-only account.

For question #3 we recommend using UserPrincipalName for nameid

For question #4, In the Sign-out page URL field in Google Cloud (G Suite) Connector, paste the value of Logout URL which you have copied from Azure portal. There is a video here:
https://azure.microsoft.com/en-us/resources/videos/enable-single-sign-on-to-google-apps-in-2-minutes...

If this post was helpful please mark as best response, thank you.