Integrating Microsoft Entra with UniFi Fabrics
UniFi Fabrics allow you to centrally manage people and permissions by integrating with Microsoft Entra (formerly Azure AD) as an Identity Provider (IdP). This enables secure, SAML-based authentication and automated user lifecycle management across UniFi services such as WiFi, VPN, and Door Access via the Identity Endpoint app.
For a list of other supported Identity Providers, see Binding an Identity Provider (IdP) To A UniFi Fabric.
Requirements
- A Fabric with Consolidated People Management enabled. For more information, see Getting Started with UniFi Fabrics.
- A Microsoft Entra ID tier that supports unlimited SSO.
- You must be assigned the Cloud Application Administrator role in Azure.
- Your Microsoft Entra tenant must be set up.
- See Quickstart: Set up a tenant to learn more.
Additional Features
- Sync user groups from Entra into UniFi requires a Microsoft Entra ID P1 or P2 license.
- Sending email-based invitations to onboard users to Identity Endpoint requires an Exchange Online plan, included in most Microsoft 365 licenses (e.g., Business Standard, E3, E5).
Method 1: Auto Setup (Recommended)
- Go to Site Manager.
- Select a Fabric.
- Navigate to Settings > Identity.
- Enable Consolidated People Management and wait for the Identity Sync Service to set up.
- Select Microsoft Entra from the list of IdPs to bind.
- Click Proceed.
- Sign in to Microsoft Entra from the window that appears.
- Read and accept the Permission request.
- Wait for authorization and SCIM setup to finish.
- Select to import All People (without Group Metadata), or Specific Groups (with Group Metadata).
- Click Apply Changes.
- (Optional) Configure Identity Endpoint Services to streamline how people interact with UniFi services such as WiFi, VPN, and Access Control.
Method 2: Manual Setup
- Go to Site Manager.
- Select a Fabric.
- Navigate to Settings > Identity.
- Enable Consolidated People Management and wait for the Identity Sync Service to set up.
- Select Microsoft Entra from the list of IdPs to bind, and enable the checkbox for Manual Entra Setup.
- Click Proceed.
- Sign in to the Microsoft Entra admin center with the role of at least a Cloud Application Administrator.
- Go to Azure services and click Enterprise applications.
- Click New application.
- Click Create your own application, enter the app name, select Integrate any other application you don't find in the gallery (Non-gallery), and click Create.
- Go to 2. Set up single sign on and click Get Started.
- Click SAML.
- Go to Basic SAML Configuration and click Edit.
- Paste the Identifier and Reply URL from UniFi into Entra.
- Click Save and then close out the Basic SAML Configuration window.
- Go to SAML Certificates and Download the Federation Metadata XML.
- Go back to UniFi and upload the Federation Metadata XML file obtained from Microsoft Entra. Click Apply Changes.
- Return to the Enterprise Application you created in Microsoft Azure, and navigate to Provisioning (within the Manage category).
- Click New Configuration.
- Paste the Tenant URL and Secret Token obtained from UniFi.
- Click Test Connection.
- Once the connection is successful, click Create.
- Return to UniFi and click Apply Changes.
- Follow Microsoft’s help article to create and assign users to the Enterprise application.
- Once users are created and assigned to the application, navigate to Provisioning (within the Manage category) > Overview.
- Click Start provisioning.
- (Optional) Return to UniFi and Configure Identity Endpoint Services to streamline how people interact with UniFi services such as WiFi, VPN, and Access Control.