Q1: How to change the expiry date of IDP certificate in Azure AD
Description
The below documentation contains the step-by-step instructions to update the expiry date of an IDP certificate in Azure portal and uploading it to the Prolaborate.
Azure Configuration
1. Add a new certificate in the SAML certificates pane.
2. Set the Expiry date as desired and click the "Save" button.
3. Click on the option and select the "Make Certificate Active" option.
4. Make sure you download the active certificate from Azure AD.
Prolaborate Configuration
1. Navigate to the SAML Single Sign-On page.
2. Proceed to upload the new certificate.
3. Click on the “Save” button.
4. Test the functionality by accessing the Prolaborate in a private tab and confirm the authentication using the
Response
Hi <Customer>,
Thank you for reaching out to Sparx Platform Support.
Please follow the steps outline below to update the IDP certificate in Azure portal and Prolaborate,
<Include Azure and Prolaborate Configuration>
By following these steps, you will be able to successfully update the expiry date of the certificate in Azure AD and Prolaborate. You can also share the certificate with us so that we will upload it to your Prolaborate’s SAML configuration.
Please let us know if you have any questions or concerns.
Reference
Ticket ID: #4521
Subject: URGENT - ENEXIS EA not working after Certificate change
Department: Sparx Platform Support
Q2: Permission Denied error when logging in with Azure AD SSO
Description
A Customer reported that they are getting “Permission Denied” error when logging in with SSO. The customer is using Azure Active Directory and we assisted them in setting SAML SSO for their Prolaborate.
Troubleshooting Steps
We set the logging level to “info” and asked the customer to try logging in with SSO, so that we will be able to see it in the logs.
After the customer did, we reached out to Product team with our inputs.
Dev team investigated the logs and found that SAML request was received as ‘role’ instead of ‘group’. We also suspected that the customer didn’t have a group added in the Azure AD. So, we asked the customer to check if the group is added to Prolaborate and shared the steps to create and add a group.
Since the customer had difficulties with the troubleshooting, we went on a call and created a new group in Azure AD and assigned the users to this new group and then added it to Prolaborate.
We also found that the group claim was missing, so we configured the group claim.
Group Claim
Add the Group claim in the Attribute Mapping section of the Prolaborate SAML Settings page.
User Group
- Make sure the user is present in the SAML group with the corresponding permissions to access the Prolaborate application. Follow the steps outlined below to check or add users to the SAML group in Azure AD SSO.
- Click on "Users and groups" and then click on the user's Display Name.
- Then click on the Group membership count to view the list of groups in which the user belongs.
- If you have not been able to find the group in the list, click on 'Add Memberships' and choose the desired SAML group.
- If you do not have a group in the "Select Groups" section, create a new group by following steps outlined below, and add this new group membership to the user.
Access Control Profile
- When the SAML group is not properly linked with its corresponding Access Control Profile, users encounter a “Permission Denied” error in Prolaborate. When the SAML group-based restriction is active, Prolaborate restricts access for users who belong to SAML groups not linked with Access Control Profiles.
- Navigate to Menu->SAML Single Sign On.
- In the Access Control Profile section, click on the drop down and select the desired Access Control Profile. If you want to add another profile and its SAML Group click on the “Add” button.

- In SAML Group field, enter the respective SAML Group name and click save.
L2 Team, Product Team
Reference
Subject: Assistants SSO usage with EASparx, Medux
Department: Sparx Platform Support
Subject: SSE SaaS EA/Prolaborate: one user can't log in
Department: Sparx Platform Support