Configure Entra ID for Single Sign-On (2024)

  • Updated

Stax integrates with your corporate identity using SAML. This allows you to bring your own identities and identity management controls to the Stax platform. Entra ID (formerly Azure Active Directory) is Microsoft's cloud-hosted identity solution. It supports integration with applications as a SAML identity provider (IdP) and is available for use by most organizations with a Microsoft 365/Office 365 tenancy.

Before You Begin

  • Estimated time to complete: 1 hour
  • Ensure you are a member of the Admin role in Stax
  • You need to be a member of the Global Admins role in Entra ID, or be delegated equivalent access to Enterprise Applications by an administrator

Prepare the SAML Service URIs

Determine your SAML Service URIs (Entity ID and SAML 2.0 Service URL) using the guidance in Configure Single Sign-On.

Create a new Enterprise Application in Entra ID/Azure AD

Once you've prepared the URIs and AD Groups, you can configure Entra ID/Azure AD.

  1. Log in to the Entra ID portal at https://entra.microsoft.com/
  2. From the left-hand navigation pane, choose Identity, then within the Applications section, choose Enterprise applicationsConfigure Entra ID for Single Sign-On (1)

  3. From the All applications page, choose + New applicationConfigure Entra ID for Single Sign-On (2)

  4. On the Add an application page, choose Non-gallery applicationConfigure Entra ID for Single Sign-On (3)

  5. On the Add your application page, enter a name for the application then click AddConfigure Entra ID for Single Sign-On (4)

  6. Once the application is created, from the Manage section, choose Single sign-on, then SAML to enable SAML for the applicationConfigure Entra ID for Single Sign-On (5)

  7. Using the details you gathered above, complete the Basic SAML configuration for the new application:
    ParameterValueExample
    Identifier (Entity ID)The entity ID you determined earlierhttps://id.security.mega-corp.au1.staxapp.cloud/auth/realms/master
    Reply URL (Assertion Consumer Service URL)The SAML 2.0 Service URL you determined earlierhttps://id.security.mega-corp.au1.staxapp.cloud/auth/realms/master/broker/saml/endpoint
    Sign on URL(blank)
    Relay State(blank)
    Logout Url(blank)
    Configure Entra ID for Single Sign-On (6)
  8. Next, click the edit button next to User Attributes & Claims and configure the Claims for the application:

    1. First, click on Unique User Identifier (Name ID) under Required claim and change the name identifier format from the default Email address to Persistent.
      Configure Entra ID for Single Sign-On (7)

    2. Save and close the Manage claim form to return to the User Attributes & Claims page
    3. In turn, update each of the Additional claims to match the following configuration and a new claim for "Role":

      Claim NameNamespaceSourceSource attribute
      email(blank)Attributeuser.mail
      firstName(blank)Attributeuser.givenname
      lastName(blank)Attributeuser.surname
      namehttp://schemas.xmlsoap.org/ws/2005/05/identity/claimsAttributeuser.userprincipalname
      Role(blank)Attributeuser.assignedroles

      Once complete, it should look like:

      Configure Entra ID for Single Sign-On (8)

  9. Return to the Single sign-on page for the Stax application to complete the configuration. If prompted to test it, choose No
  10. In section 3 of the Single sign-on page, download the Federation Metadata XML file

Configure Application Roles

Once you have an Enterprise App configured, you need to configure the application roles that will populate the user.assignedroles attribute.

  1. In the Entra ID Portal, from the left-hand navigation pane, choose Identity, then within the Applications section choose App Registrations
  2. On the App registration page, choose the All applications tab
  3. From the All applications view, select the Stax application you defined
  4. From the Application Overview select App roles from the left hand navigation
  5. In turn, choose Create app role and match the following configuration:
    Display NameAllowed member typesValueDescription
    customer_costadminUsers/Groupscustomer_costadminStax platform cost and compliance administrators
    customer_readonlyUsers/Groupscustomer_readonlyStax platform read only users
    customer_userUsers/Groupscustomer_userStax platform users
    customer_adminUsers/Groupscustomer_adminStax platform administrators

Assign Users and Groups

When assigning users to the application, you must ensure that a given user is only associated with a single app role, otherwise the user will be unable to log into Stax. Roles can be associated directly against a user or inherited from a group. If a user is a member of two or more groups, those groups must be associated to the same role, such as customer_admin.

  1. From the left-hand navigation pane, choose Identity, then within the Applications section choose Enterprise applications
  2. From the All Applications view, select, select the Stax application you defined
  3. Select the Users and groups option from the left hand navigation and chose Add user/group
  4. Select the users and groups you wish to sync and then the desired role and click assign
  5. Repeat this process for each set of users and or groups that require a different role

Configure Stax to Allow Azure AD Sign-In

Once the enterprise application has been configured, you will need to raise a support case with your Federation Metadata XML and the SAML 2.0 Service URL.

Stax does not support IdP-initiated sign-ins. You must use SP-initiated sign-in to access Stax.

When Stax's support team has completed your request, the next time you navigate to your Stax Console login page, on the top, you'll see a new Continue with Corporate ID button. Clicking this button will take you to your SAML sign-in page. Log in to the IdP and you'll be signed into your Stax tenancy as a federated user.

Configure Entra ID for Single Sign-On (9)

Retrieve Credentials for SCIM

Stax uses SCIM (System for Cross-domain Identity Management) for user and group provisioning with Azure AD. This allows user and group provisioning and updates to occur in advance of a user logging in to Stax.

  1. Log into the Stax console as Admin and open the customer menu in the left-hand nav (click the arrow next to your organization alias), then choose SCIM
  2. Choose Generate Credentials to generate new SCIM credentials for Azure AD to use to authenticate to Stax
  3. Record the URL and bearer token for later use
    Configure Entra ID for Single Sign-On (10)

Configure SCIM Provisioning

  1. From the left-hand navigation pane in the Entra ID Portal, choose Identity, then within the Applications section choose Enterprise applications
  2. From the All Applications view, select, select the Stax application you defined
  3. Select Provisioning from the left hand navigation and then Get Started
  4. Change Provisioning Mode to Automatic and paste in the previously copied SCIM URL and Bearer Token values
  5. Click Test connection and then Save once successful
  6. Expand the new Mappings section and select the Provision Azure Active Directory Users mapping
  7. Delete all existing mappings and edit the last remaining mandatory attribute:
    Mapping TypeSource Attribute
    Target Attribute
    Match objects
    using this
    attribute
    Matching precedence
    Directmailemails[type eq "work"].valueyes1
  8. In turn, choose Add New Mapping and match the following configuration:
    Mapping TypeSource Attribute / Expression
    Target Attribute
    ExpressionSwitch([IsSoftDeleted], , "False", "True", "True", "False")active
    DirectuserPrincipalNameuserName
    DirectgivenNamename.givenName
    Directsurnamename.familyName
    DirectobjectIdexternalId
    ExpressionSingleAppRoleAssignment([appRoleAssignments])roles[primary eq "True"].value

    Common configuration:

    SettingValue
    Default Value if null(blank)
    Match objects using this attributeNo
    Apply this mappingAlways
  9. Click save and return to the Provisioning breadcrumb
  10. Select the Provision Azure Active Directory Groups mapping and confirm the default mappings
    Mapping TypeSource Attribute / Expression
    Target Attribute
    Matching Precedence
    DirectdisplayNamedisplayName1
    DirectobjectIdexternalId0
    Directmembersmembers0
  11. Return to the Provisioning breadcrumb
  12. Expand the Settings section and confirm Scope is set toSync only assigned users and groups

Provision Users and Groups

  1. From the left-hand navigation pane, choose Identity, then within the Applications section choose Enterprise applications
  2. From the All Applications view, select, select the Stax application you defined
  3. Select Provisioning from the left hand navigation and click Start provisioning
  4. Once the provisioning cycle has completed, review the logs for any errors
  5. Log into the Stax console with your existing non-federated user credentials
  6. Open the customer menu in the left-hand nav (click the arrow next to your organization alias), then choose Users, confirm the desired users are present
  7. Open the customer menu in the left-hand nav (click the arrow next to your organization alias), then choose Groups, confirm the desired groups are present with desired memberships

Related articles

  • Deploy the Stax-Provisioning Role to Allow Stax Onboarding
  • Configure Single Sign-On
  • Understanding Financial Mode
  • API Token Permissions
Configure Entra ID for Single Sign-On (2024)
Top Articles
ARK Breeding & Mutations Guide
The War Within 10.0.2 Patch Notes
D&C Newspaper Obituaries
Are Pharmacy Open On Sunday
London (Greater London) weather
Feliz Domingo Bendiciones, Mensajes cristianos para compartir | Todo imágenes
Gopher Hockey Forum
Seacrest 7 Piece Dining Set
Job Shop Hearthside Schedule
Shaw Centre for the Salish Sea — Eight Arms, Eight Interesting Facts: World Octopus Day
Jobs Hiring Start Tomorrow
‘Sound of Freedom’ Is Now Streaming: Here’s Where to Stream the Controversial Crime Thriller Online for Free
Mta Bus Time Q85
Nyc Peep Show 2022
Syncb Ameg D
888-490-1703
Naughty Neighbor Tumblr
All classes in Pathfinder: Wrath of the Righteous
Inside the Rise and Fall of Toys ‘R’ Us | HISTORY
Cuộc thi “Chung tay vì an toàn giao thông” năm 2024
Becker County Jail Inmate List
V Pay - Alle Informationen zu dem Zahlungssystem für die Girocard
Party City Enfield Photos
24 Hour Pharmacy St Louis Mo
Clarksville.craigslist
Kamala Harris, Donald Trump debate prompts major endorsem*nt, Fox News invitation for a 2nd face-off
Red Lobster cleared to exit bankruptcy under new owner Fortress
Kristine Leahy Spouse
Aussiebigdaddik
Seattle Clipper Vacations Ferry Terminal Amtrak
Zwei-Faktor-Authentifizierung (2FA) für Ihre HubSpot-Anmeldung einrichten
Omaha Steaks Molten Lava Cake Instructions
Ullu Web Series 123
Log in or sign up to view
Brublackvip
About Us - Carrols Corporation
Wgu Admissions Login
Otter Bustr
Vernon Autoplex
Herbalism Guide Tbc
Ma Scratch Tickets Codes
Nature's Medicine Uxbridge Menu
Grupos De Cp Telegram
Cnas Breadth Requirements
421 West 202Nd Street
Tighe Hamilton Hudson Ma Obituary
Melisa Mendini Wiki, Age, Boyfriend, Height, Career, Photos
Noel Berry's Biography: Age, Height, Boyfriend, Family, Net Worth
Veracross Login Bishop Lynch
Tinfoil Unable To Start Software 2022
Sir Anthony Quayle, 76; Actor Won Distinction in Theater, Film, TV
Youtube Verify On Payment Methods Page
Latest Posts
Article information

Author: Jeremiah Abshire

Last Updated:

Views: 6173

Rating: 4.3 / 5 (74 voted)

Reviews: 89% of readers found this page helpful

Author information

Name: Jeremiah Abshire

Birthday: 1993-09-14

Address: Apt. 425 92748 Jannie Centers, Port Nikitaville, VT 82110

Phone: +8096210939894

Job: Lead Healthcare Manager

Hobby: Watching movies, Watching movies, Knapping, LARPing, Coffee roasting, Lacemaking, Gaming

Introduction: My name is Jeremiah Abshire, I am a outstanding, kind, clever, hilarious, curious, hilarious, outstanding person who loves writing and wants to share my knowledge and understanding with you.