Configuring AzureAD/EntraID - SAML - SSO
Overview
This guide will help you integrate and configure AzureAD/EntraID with Cyolo using SSO via the SAML protocol.
Pre-requisites
- Have already created groups and users in Microsoft 365 Admin/EntraID/AzureAD.
Further possibilities
- Configuring user provisioning (SCIM); see Configuring AzureAD/EntraID - SAML - SCIM\
Configuration
EntraID
Create a new Enterprise Application
- Go to the following URL and sign in with your Microsoft account: Microsoft Entra admin center.
- Navigate to Applications → Enterprise Applications → All Applications.
- Click the New Application button and then click on the Create Your Own Application button to create a new application.
- Enter a Name for this application, then select the Include any other application you don't find in the Gallery (Non-Gallery) option and click the Create button.
Pre-configure the SSO
- In the new application settings, navigate to Single sign-on and select SAML.
Basic SAML Configuration
- In the Basic SAML Configuration section, click the Edit button.
- In the Identifier (Entity ID) section, click the Add Identifier button and enter a unique name.
- Identifier (Entity ID) → Entity issuer field in Cyolo
It should match this field in Cyolo, no matter what name you enter.
- Identifier (Entity ID) → Entity issuer field in Cyolo
- In the Reply URL (Assertion Consumer Service URL) section, click the Add reply URL button and enter a dummy URL like:
https://cyolo.io
(we will change it later).- Reply URL (Assertion Consumer Service URL) ← Redirect URI from Cyolo
- Click on the Save button.
SAML Certificates
-
In the SAML Certificates section, download the Certificate (Base64) certificate.
-
If you open the link of the App Federation Metadata URL field in a new tab, you will see all the attributes that the EntraID application can send to Cyolo. Later, we will use the URI of some attributes:
<auth:ClaimType xmlns:auth="http://docs.oasis-open.org/wsfed/authorization/200706" Uri="http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name"> <auth:DisplayName>Name</auth:DisplayName> <auth:Description>The mutable display name of the user.</auth:Description> </auth:ClaimType>
Set up
In the Set up section, save the following values on the side:
- Login URL → SSO URL field in Cyolo
- Microsoft Entra Identifier → SSO Issuer field in Cyolo
Cyolo
Create a new SAML IDP integration
- Open the Cyolo Console: https://console.YOURTENANTNAME.cyolo.io/
- Navigate to Integrations → Identity providers.
- Click the New button to create a new integration.
Identity Provider Type
- In the Identity Provider Type section, enter a Name for the integration.
- Select the SAML type and click Next.
Identity Provider Details
- In the Identity Provider Details section, fill in the fields as follows:
- Entity issuer ← Identifier (Entity ID) from EntraID
- SSO URL ← Login URL from EntraID
- SSO Issuer ← Microsoft Entra Identifier from EntraID
- CA trusted certificate ← Certificate (Base64) from EntraID
- In the Attributes mapping section, fill the IdP attribute vales of each desired Cyolo attribute fields as follows:
Cyolo Attribute | IdP Attribute Value |
---|---|
Username | http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name |
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name | |
First name | http://schemas.xmlsoap.org/ws/2005/05/identity/claims/givenname |
Last name | http://schemas.xmlsoap.org/ws/2005/05/identity/claims/surname |
- Click Next to continue.
- Since the Email Address (/claims/emailaddress) attribute is optional when creating a user in AzureAd, we recommend using the User Principal Name(/claims/name) attribute for the Email field instead.
- In order to use the Phone number & Personal desktop attributes, you must create a custom claim attribute in the EntraID application.
- The authentication process will fail if a configured IdP attribute is missing from the user object in AzureAD during authentication. Therefore, ensure that all users have the attributes configured.
MFA Parameter
- Select the MFA provider and methods you want to configure.
- Click Next.
- External provider means Cyolo will trust the MFA of the IdP for user enrollment.
Enrollment Method
- Click the Create button after selecting your desired options:
-
Personal Desktop
The user will be prompted to enter their Personal Desktop IPs.Uncheck if the Personal Desktop IDP attribute has already been configured in the Identity Provider Details section.
-
Admin rollout
Admin must create the user in Cyolo before authentication is attempted. -
Self-service enrollment
The user is automatically created in Cyolo (if not already present) upon first authentication.
- Save the Redirect URI value provided by Cyolo.
EntraID Configuration
Configure the SSO
- Go to Microsoft Entra admin center and sign in.
- Navigate to:
Applications → Enterprise Applications → All Applications - Open the previously created Enterprise Application.
- In the Basic SAML Configuration section of the Single sign-on tab, click Edit.
- In the Reply URL (Assertion Consumer Service URL) field, replace the dummy URL with the Redirect URI saved from Cyolo.
Assign Users and Groups to the Application
- Navigate to the Users and groups tab.
- Click Add user/group.
- In the Users and groups field, click None Selected.
- Add all users and groups that need to authenticate to your Cyolo tenant using this IDP.
Now your AzureAD/EntraID SSO integration with Cyolo is ready!
Testing
EntraID
- Open the Microsoft Entra admin center.
- Navigate to:
Applications → Enterprise Applications → All Applications - Open the previously created Enterprise Application.
- In the Test single sign-on section of the Single sign-on tab, click Test.
- In the Testing sign in section, click Test sign in.
- Log in using a user credential assigned to the application.
IF successful, you are now redirected to the tenant portal and logged in.
Cyolo
- Open the Cyolo Portal:
https://users.YOURTENANTNAME.cyolo.io/
- Log in using a user credential assigned in the EntraID Enterprise Application.
If everything went well, you'll be logged into the tenant portal.
Logs
EntraID
- Open the Microsoft Entra admin center.
- Navigate to:
Applications → Enterprise Applications → All Applications - Open the previously created Enterprise Application.
- Go to the Sign-in logs tab to view user login logs.
Cyolo
Tenant Console
- Open the Cyolo Console:
https://console.YOURTENANTNAME.cyolo.io
- Navigate to: Monitoring → Activity
Idac Console
- SSH into one of your Idacs.
- Run the following command:
sudo docker logs -f config_idac_1 --since 1h 2>&1 | sudo grep -i user
Updated 7 days ago