Configuring Azure Active Directory identity federation in CDP

You can onboard users by configuring Azure Active Directory (Azure AD) identity federation with CDP.

Before you begin

In order to be compatible with CDP, your Azure AD should be configured to synchronize with on premises Azure AD via Azure AD Connect sync tool. As per Azure documentation, you must use Azure AD Connect or newer.

Required role: PowerUser


  1. Log in to CDP web interface and navigate to Management Console > User Management, select the Identity Providers tab and click on Create Identity Provider to create an identity provider.

  2. Name your identity provider in CDP, for example MyCompany_AAD.

  3. Click Create.

  4. Click on MyCompany_AAD on CDP console and copy the CDP SAML Service Provider Metadata to an XML file (for example, saml-metadata.xml). You will need it later.

  5. Open another web browser window, navigate to, and log in to your Azure Portal.

  6. On your Azure Portal, navigate to the Azure Active Directory.

  7. Select the Enterprise applications service.

  8. Click on the +New application button.

  9. Select the Non-gallery application.

  10. Give the application a name, for example. CDP_id_federation.

  11. Click on the +Add button.

  12. Once the application is added, go to 2. Set up single sign on .

  13. Upload the metadata XML file that you saved in the earlier step.

  14. Download the Federation Metadata xml for your Azure AD application and save it on your computer.

  15. Switch back to CDP web interface and upload the metadata saved from AD and update the identity provider.
    1. Find the identity provider that you just created in CDP.
    2. Click the Actions button and select Update Identity Provider.
    3. On the Identity Provider window, upload the metadata XML file that you saved previously or copy and paste the content of that XML file:
    4. Verify the updates and click Update.
  16. Switch back to Azure AD Azure Portal browser window.

  17. Edit 1.Basic SAML Configuration:
    1. Make sure that the value for Identifier (Entity ID) is populated, for example “urn:cloudera:cdp:<Identity-Provider-Id>” or “urn:cloudera:altus” for legacy identity provider. Check the Service Provider Metadata to determine which identifier to use.
    2. From CDP SAML Service Provider Metadata you saved earlier, copy the AssertionConsumerService > Location value and paste it into the line Reply URL (Assertion Consumer Service URL).
  18. Edit 2.User Attributes & Claims:
    1. If the customer is using on-prem Active Directory and Active Directory Connect to sync with Azure AD, you will be able to import Azure AD groups into CDP. Click +Add a group claim.
    2. On the Group Claims blade, do the following:
      1. Select Security groups or Groups assigned to the application.
      2. Select Source Attribute sAMAccountName.
      3. Check the Customize the name of the group claim.
      4. Enter “groups” in Name (Required).
      5. Namespace enter
      6. Click Save.
    3. For the rest of the claims, follow the instructions at Configuring your enterprise IdP to work with CDP.
    Name Namespace Source Source Attribute
    firstName Attribute user.givenname
    lastName Attribute user.surname
    mail Attribute user.mail
  19. Click on the SAML-based Sign-On on the top.
  20. Test this application.

Once these steps are completed, a CDP user will login with their integrated Azure AD identity through their Office 365 applications page ( A new tile will appear for the CDP application created above.

Once a user signs in, the User and Groups will show up on the CDP Management Console’s User Management screen.

What to do next:
  • Assign users to groups within your Azure AD that you will map to roles in CDP.
  • Assign CDP roles to either the new users or the groups as appropriate.