Follow the examples below to configure Azure as the SAML identity provider (IdP) for Dynatrace SSO.
This page describes the IdP (Azure) end of your SAML SSO configuration, not the Dynatrace end. Use it as part of the entire SAML configuration procedure for Dynatrace SaaS if you're using Azure.
While we do our best to provide you with current information, Dynatrace has no control over changes that may be made by third-party providers. Always refer to official third-party documentation from your IdP as your primary source of information for third-party products.
Dynatrace in the Search application field, then select Dynatrace.Dynatrace) and select Create to add the application. The Overview page of your application will open automatically.SAML as the single sign-on method.https://sso.dynatrace.com:443/saml2/sp/logout. Save your changes.First name attribute
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/givenname
Last name attribute
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/surname
Group attribute
http://schemas.microsoft.com/ws/2008/06/identity/claims/groups
Note that in the SAML message returned by Azure, groups are identified with an ObjectId, not a group name. When configuring the user group mapping, make sure you use ObjectId in SAML Group Attribute Value field.
Yes, such change is done internally in Azure and would not break the existing federation.