Tutorial: Azure Active Directory single sign-on integration with Catchpoint
In this tutorial, you learn how to integrate Catchpoint with Azure Active Directory (Azure AD). When you integrate Catchpoint with Azure AD, you can:
- Control user access to Catchpoint from Azure AD.
- Enable automatic Catchpoint sign-in for users with Azure AD accounts.
- Manage your accounts in one central location: the Azure portal.
Prerequisites
To get started, you need the following items:
- An Azure AD subscription. If you don't have a subscription, you can get a free account.
- A Catchpoint subscription with single sign-on (SSO) enabled.
Scenario description
In this tutorial, you configure and test Azure AD SSO in a test environment.
- Catchpoint supports SP-initiated and IDP-initiated SSO.
- Catchpoint supports just-in-time (JIT) user provisioning.
Add Catchpoint from the gallery
To configure the integration of Catchpoint into Azure AD, add Catchpoint to your list of managed SaaS apps.
- Sign in to the Azure portal with a work, school, or personal Microsoft account.
- On the left pane, select the Azure Active Directory service.
- Go to Enterprise Applications and then select All Applications.
- To add a new application, select New application.
- In the Add from the gallery section, type Catchpoint in the search box.
- Select Catchpoint from the results panel and then add the app. Wait a few seconds while the app is added to your tenant.
Alternatively, you can also use the Enterprise App Configuration Wizard. In this wizard, you can add an application to your tenant, add users/groups to the app, assign roles, as well as walk through the SSO configuration as well. Learn more about Microsoft 365 wizards.
Configure and test Azure AD SSO for Catchpoint
For SSO to work, you need to link an Azure AD user with a user in Catchpoint. For this tutorial, we'll configure a test user called B.Simon.
Complete the following sections:
- Configure Azure AD SSO, to enable this feature for your users.
- Create an Azure AD test user, to test Azure AD single sign-on with B.Simon.
- Assign the Azure AD test user, to enable B.Simon to use Azure AD single sign-on.
- Configure Catchpoint SSO, to configure the single sign-on settings on the application side.
- Create Catchpoint test user, to allow linking of the B.Simon Azure AD test account to a similar user account in Catchpoint.
- Test SSO, to verify that the configuration works.
Configure Azure AD SSO
Follow these steps in the Azure portal to enable Azure AD SSO:
Sign in to the Azure portal.
On the Catchpoint application integration page, find the Manage section and select single sign-on.
On the Select a single sign-on method page, select SAML.
On the Set Up Single Sign-On with SAML page, select the pencil icon to edit the Basic SAML Configuration settings.
Configure the initiated mode for Catchpoint:
- For IDP-initiated mode, enter the values for the following fields:
- For Identifier:
https://portal.catchpoint.com/SAML2
- For Reply URL:
https://portal.catchpoint.com/ui/Entry/SingleSignOn.aspx
- For Identifier:
- For SP-initiated mode, select Set additional URLs and enter the following value:
- For Sign-on URL:
https://portal.catchpoint.com/ui/Entry/SingleSignOn.aspx
- For Sign-on URL:
- For IDP-initiated mode, enter the values for the following fields:
The Catchpoint application expects the SAML assertions in a specific format. Add custom attribute mappings to your configuration of SAML token attributes. The following table contains the list of default attributes:
Name Source attribute Givenname user.givenneame Surname user.surname Emailaddress user.mail Name user.userprincipalname Unique User Identifier user.userprincipalname Also, the Catchpoint application expects another attribute to be passed in a SAML response. See the following table. This attribute is also pre-populated, but you can review and update it to fit your requirements.
Name Source attribute namespace user.assignedrole Note
The
namespace
claim needs to be mapped with the account name. This account name should be set up with a role in Azure AD to be passed back in SAML response. For more information about roles in Azure AD, see Configure the role claim issued in the SAML token for enterprise applications.Go to the Set Up Single Sign-On with SAML page. In the SAML Signing Certificate section, find Certificate (Base64). Select Download to save the certificate to your computer.
In the Set up Catchpoint section, copy the URLs that you need in a later step.
Create an Azure AD test user
In this section, you use the Azure portal to create an Azure AD test user called B.Simon.
- From the left pane in the Azure portal, select Azure Active Directory > Users > All users.
- Select New user at the top of the screen.
- In the User properties, follow these steps:
- In the Name field, enter
B.Simon
. - In the User name field, enter the username@companydomain.extension. For example, enter
B.Simon@contoso.com
. - Select the Show password check box. Note the displayed password value.
- Select Create.
- In the Name field, enter
Assign the Azure AD test user
In this section, you enable B.Simon to use Azure single sign-on by granting access to Catchpoint.
- In the Azure portal, select Enterprise Applications > All applications.
- In the applications list, select Catchpoint.
- In the app's overview page, find the Manage section and select Users and groups.
- Select Add user, and then select Users and groups in the Add Assignment dialog box.
- In the Users and groups dialog box, select B.Simon from the list of users. Click Select at the bottom of the screen.
- If you have setup the roles as explained in the above, you can select it from the Select a role dropdown.
- In the Add Assignment dialog box, select Assign.
Configure Catchpoint SSO
In a different web browser window, sign in to the Catchpoint application as an administrator.
Select the Settings icon and then SSO Identity Provider.
On the Single Sign On page, enter the following fields:
Field Value Namespace A valid namespace value. Identity Provider Issuer The Azure AD Identifier
value from the Azure portal.Single Sign On Url The Login URL
value from the Azure portal.Certificate The contents of the downloaded Certificate (Base64)
file from the Azure portal. Use Notepad to view and copy.You might also upload the Federation Metadata XML by selecting the Upload Metadata option.
Select Save.
Create a Catchpoint test user
Catchpoint supports just-in-time user provisioning, which is enabled by default. You have no action items in this section. If B.Simon doesn't already exist as a user in Catchpoint, it's created after authentication.
Test SSO
In this section, you test your Azure AD single sign-on configuration with following options.
SP initiated:
Click on Test this application in Azure portal. This will redirect to Catchpoint Sign on URL where you can initiate the login flow.
Go to Catchpoint Sign-on URL directly and initiate the login flow from there.
IDP initiated:
- Click on Test this application in Azure portal and you should be automatically signed in to the Catchpoint for which you set up the SSO
You can also use Microsoft My Apps to test the application in any mode. When you click the Catchpoint tile in the My Apps, if configured in SP mode you would be redirected to the application sign on page for initiating the login flow and if configured in IDP mode, you should be automatically signed in to the Catchpoint for which you set up the SSO. For more information about the My Apps, see Introduction to the My Apps.
Note
When you're signed in to the Catchpoint application through the login page, after providing Catchpoint Credentials, enter the valid Namespace value in the Company Credentials(SSO) field and select Login.
Next steps
After you configure Catchpoint, you can enforce session control. This precaution protects against exfiltration and infiltration of your organization's sensitive data in real time. Session control is an extension of Conditional Access. Learn how to enforce session control with Microsoft Defender for Cloud Apps.
Feedback
Submit and view feedback for