CA PAM documentation provides means of using Azure as an IdP under several constraints:
The procedure requires as well to create an application in Azure, provide PAM Assertion consumer services URL to Azure, include Azure Metadata in PAM and get a secret to be used with the Azure registration
However, there may be situations where JIT is not necessary and there is no need to manage devices or users in Azure from PAM. As such, no Azure Client is really necessary, no Azure application and target account must be defined.
In this case Azure is just used for SSO: that it, there must be a local user defined (imported for instance through LDAP) already defined in Azure and Azure sole function is to authenticate the user and allow login to PAM
This configuration is simpler than the Azure as an IdP with PAM acting as a client. This article provides what steps must be followed
To be able to use Azure just as a SSO IdP, with no device or user management, you need to do the following:
With this it should be able to do SSO to PAM with any of the users specified under AzureSAMLUsers without needing to have an Azure management subscription. However, note that users and machines in Azure won't be discovered by default if this configuration is used. There will be no JIT and the users will need to be managed manually