Three lines

Uber

Developers

Microsoft Entra ID (Azure AD)

https://learn.microsoft.com/en-us/azure/active-directory/saas-apps/uber-tutorial

  1. Sign in to the Azure portal using your Azure AD administrator credentials.

  2. Navigate to the Azure AD application that you want to configure for SAML. To do this, go to the Azure Active Directory page, select “Enterprise Applications,” and then choose the application you want to configure. (Search for “Uber” - it can be the same application used to configure SCIM.).

  3. Click on “Single sign-on” in the left-hand menu. Under “Select a Single sign-on method,” choose SAML.

  4. Finding Sign-in URL: Navigate to the “Set up” section to find the Login URL. This is the URL that you will need to provide to Uber Support as the Identity provider sign-in URL. Sign-in URL

  5. Finding the Public key: Navigate to the “SAML Signing Certificate” section. You will see two options: “Certificate (Base64)” and “Download.” Click on “Certificate (Base64)” to display the public key in Base64-encoded format. You can copy and paste this into your SAML application’s configuration. Alternatively, you can download the public key in either PEM or DER format by clicking on “Download.” This will download a file containing the public key.

  6. Finding Metadata URL: App Federation Metadata Url’ will be the metadata URL that needs to be shared with Uber. Public key will be embedded in this link.

  7. Setting Identifier field and Relay state: Click on “Single sign-on” in the left-hand menu. Under “Select a Single sign-on method,” choose SAML.

    • Click on edit under ‘Basic SAML Configuration’ and add ‘uber.com’ as identifier.
      Note: value should be ‘uber.com’ and NOT ‘https//:uber.com’
    • Set relay state as ‘nextURL=https://business.uber.com’

    Relay State

Uber

Developers
© 2023 Uber Technologies Inc.