-
-
Notifications
You must be signed in to change notification settings - Fork 81
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Update Azure AD SAML docs for Entra ID
- Loading branch information
Showing
3 changed files
with
83 additions
and
83 deletions.
There are no files selected for viewing
This file was deleted.
Oops, something went wrong.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,82 @@ | ||
# Microsoft Entra ID - SAML integration | ||
|
||
This is a quick guide to help integrate Zentral with [Microsoft Entra ID](https://learn.microsoft.com/en-us/entra/identity/enterprise-apps/add-application-portal-setup-sso) using SAML for single sign-on. | ||
|
||
In Zentral, identity providers (IdP) are configured using realms. There are three kinds of realm: SAML, OIDC, and LDAP. In this case, we will use a SAML realm. | ||
|
||
We will start by setting up an Entra ID Enterprise Application with the Basic SAML Configuration. We will then configure a Zentral realm for this application. Finally, we will update the Entra ID application configuration. | ||
|
||
|
||
## Create an Entra ID application | ||
|
||
Follow along with the Entra documentation available [here](https://learn.microsoft.com/en-us/entra/identity/enterprise-apps/add-application-portal-setup-sso). | ||
|
||
### Create the app | ||
|
||
Browse to Entra ID `Enterprise Applications`, select `Create your own application` and opt for `Non-gallery application`, set a name and click `Create`, this will take you to a newly created app. | ||
|
||
Select the `Single Sign-On` option in the tiles or in the menu to start the setup, select the `SAML` option for editing the configuration. | ||
|
||
### Configure the SAML settings | ||
|
||
#### General | ||
|
||
⚠️ The Zentral URLs for the SAML integration are only available after the realm has been saved. In order to be able to save the realm, we need the metadata from the Entra ID Enterprise App. This is a chicken-egg kind of problem. That's why we suggest first use temporary dummy values for some of the `required` fields in Entra ID initially and update them later. | ||
|
||
1. Set dummy values for the `Identifier (Entity ID)` and `Reply URL (Assertion Consumer Service URL)` required fields. Note that the URL must include `https://` even for dummy values. | ||
2. Keep the default settings for the `Attributes & Claims` section. | ||
|
||
#### Attribute Statements | ||
|
||
Use the attribute mappings provided below when configuring the Zentral realm with Entra ID for SSO. | ||
|
||
| **Zentral realm - Attribute** | **Claim name** | **Entra ID Value** | | ||
| ---------------- | ---------------------- | ---------------------- | | ||
| Username claim | name | user.userprincipalname | | ||
| Email claim | emailAddress | user.mail | | ||
| First name claim | givenName | user.givenname | | ||
| Last name claim | surname | user.surname | | ||
|
||
The default SAML claim mappings (see above) in Entra ID may not align with your organization's needs and could require adjustments. | ||
|
||
### Download the Entra ID Enterprise App metadata | ||
|
||
Download the `Federation Metadata XML` file from the `SAML Certificates` section. | ||
|
||
## Create the Zentral realm | ||
|
||
In Zentral, go to `Setup > Realms`, click on `Create realm` and select `SAML realm`. | ||
|
||
Fill out the form: | ||
|
||
- Pick a name for the Realm config | ||
- Select `Enabled for login` if you want to use this realm as login realm | ||
- Pick a login session expiry (can be left empty, see help text) | ||
- Use the default claim mappings from the Entra ID SAML settings (see [section above](#attribute-statements)) for the claims | ||
- Leave `Full name claim` empty | ||
- Upload the metadata file you just saved (see [previous section](#download-the-entra-id-enterprise-app-metadata)) | ||
- If you want to allow logins initiated by the IDP, tick the box | ||
|
||
## Update the Entra ID application | ||
|
||
We now have all the values required to finish configuring the Entra ID application. | ||
In the Entra ID Enterprise app, update the SAML settings in the `Basic SAML Configuration` tab: | ||
|
||
| **Entra ID application** | **Zentral realm** | | ||
| --------------------------- | ---------------------------------------------------------------- | | ||
| Identifier (Entity ID) | Entity ID | | ||
| Reply URL (Assertion Consumer Service URL) | Assertion Consumer Service URL | | ||
|
||
|
||
You can check that everything is working by clicking the 'Test' button (icon to the right of the realm name) on the Zentral realm detail page. It will trigger an authentication with the IdP and display the claims Zentral receives with their mappings. | ||
|
||
## Optional: Group mappings | ||
|
||
You can map Entra ID claim/value pairs to Zentral groups, see details [here](https://learn.microsoft.com/en-us/entra/identity/hybrid/connect/how-to-connect-fed-group-claims) | ||
This allows you to manage the group memberships from Entra ID. | ||
|
||
In the Zentral realm detail page, click on the `Create` button under `Group mapping`. Pick a claim, a value, and a group. Please note that the claim for groups in the SAML claims returned can be a full-length URL, such as 'http://schemas.microsoft.com/ws/2008/06/identity/claims/groups'. The corresponding value of a desired group is usually the EntraID `Object ID`, which is the UUID for the group. | ||
|
||
When users log in and their claim matches, they will be added to the group. If the claim does not match, they will be removed from the group. | ||
|
||
The mappings can be tested with the 'Test' button (icon to the right of the realm name). |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters