Tutorial: Azure Active Directory single sign-on integration with Catchpoint

In this tutorial, you learn how to integrate Catchpoint with Azure Active Directory (Azure AD). When you integrate Catchpoint with Azure AD, you can:

  • Control user access to Catchpoint from Azure AD.
  • Enable automatic Catchpoint sign-in for users with Azure AD accounts.
  • Manage your accounts in one central location: the Azure portal.


To get started, you need the following items:

  • An Azure AD subscription. If you don't have a subscription, you can get a free account.
  • A Catchpoint subscription with single sign-on (SSO) enabled.

Scenario description

In this tutorial, you configure and test Azure AD SSO in a test environment.

  • Catchpoint supports SP-initiated and IDP-initiated SSO.
  • Catchpoint supports just-in-time (JIT) user provisioning.

To configure the integration of Catchpoint into Azure AD, add Catchpoint to your list of managed SaaS apps.

  1. Sign in to the Azure portal with a work, school, or personal Microsoft account.
  2. On the left pane, select the Azure Active Directory service.
  3. Go to Enterprise Applications and then select All Applications.
  4. To add a new application, select New application.
  5. In the Add from the gallery section, type Catchpoint in the search box.
  6. Select Catchpoint from the results panel and then add the app. Wait a few seconds while the app is added to your tenant.

Alternatively, you can also use the Enterprise App Configuration Wizard. In this wizard, you can add an application to your tenant, add users/groups to the app, assign roles, as well as walk through the SSO configuration as well. Learn more about Microsoft 365 wizards.

Configure and test Azure AD SSO for Catchpoint

For SSO to work, you need to link an Azure AD user with a user in Catchpoint. For this tutorial, we'll configure a test user called B.Simon.

Complete the following sections:

  1. Configure Azure AD SSO, to enable this feature for your users.
  2. Configure Catchpoint SSO, to configure the single sign-on settings on the application side.
  3. Test SSO, to verify that the configuration works.

Configure Azure AD SSO

Follow these steps in the Azure portal to enable Azure AD SSO:

  1. Sign in to the Azure portal.

  2. On the Catchpoint application integration page, find the Manage section and select single sign-on.

  3. On the Select a single sign-on method page, select SAML.

  4. On the Set Up Single Sign-On with SAML page, select the pencil icon to edit the Basic SAML Configuration settings.

    Edit Basic SAML Configuration

  5. Configure the initiated mode for Catchpoint:

    • For IDP-initiated mode, enter the values for the following fields:
      • For Identifier: https://portal.catchpoint.com/SAML2
      • For Reply URL: https://portal.catchpoint.com/ui/Entry/SingleSignOn.aspx
    • For SP-initiated mode, select Set additional URLs and enter the following value:
      • For Sign-on URL: https://portal.catchpoint.com/ui/Entry/SingleSignOn.aspx
  6. The Catchpoint application expects the SAML assertions in a specific format. Add custom attribute mappings to your configuration of SAML token attributes. The following table contains the list of default attributes:

    Name Source attribute
    Givenname user.givenneame
    Surname user.surname
    Emailaddress user.mail
    Name user.userprincipalname
    Unique User Identifier user.userprincipalname

    User Attributes & Claims list screenshot

  7. Also, the Catchpoint application expects another attribute to be passed in a SAML response. See the following table. This attribute is also pre-populated, but you can review and update it to fit your requirements.

    Name Source attribute
    namespace user.assignedrole


    The namespace claim needs to be mapped with the account name. This account name should be set up with a role in Azure AD to be passed back in SAML response. For more information about roles in Azure AD, see Configure the role claim issued in the SAML token for enterprise applications.

  8. Go to the Set Up Single Sign-On with SAML page. In the SAML Signing Certificate section, find Certificate (Base64). Select Download to save the certificate to your computer.

    The certificate download link

  9. In the Set up Catchpoint section, copy the URLs that you need in a later step.

    Copy configuration URLs

Create an Azure AD test user

In this section, you use the Azure portal to create an Azure AD test user called B.Simon.

  1. From the left pane in the Azure portal, select Azure Active Directory > Users > All users.
  2. Select New user at the top of the screen.
  3. In the User properties, follow these steps:
    1. In the Name field, enter B.Simon.
    2. In the User name field, enter the username@companydomain.extension. For example, enter B.Simon@contoso.com.
    3. Select the Show password check box. Note the displayed password value.
    4. Select Create.

Assign the Azure AD test user

In this section, you enable B.Simon to use Azure single sign-on by granting access to Catchpoint.

  1. In the Azure portal, select Enterprise Applications > All applications.
  2. In the applications list, select Catchpoint.
  3. In the app's overview page, find the Manage section and select Users and groups.
  4. Select Add user, and then select Users and groups in the Add Assignment dialog box.
  5. In the Users and groups dialog box, select B.Simon from the list of users. Click Select at the bottom of the screen.
  6. If you have setup the roles as explained in the above, you can select it from the Select a role dropdown.
  7. In the Add Assignment dialog box, select Assign.

Configure Catchpoint SSO

  1. In a different web browser window, sign in to the Catchpoint application as an administrator.

  2. Select the Settings icon and then SSO Identity Provider.

    Catchpoint settings screenshot with SSO Identity Provider selected

  3. On the Single Sign On page, enter the following fields:

    Catchpoint Single Sign On page screenshot

    Field Value
    Namespace A valid namespace value.
    Identity Provider Issuer The Azure AD Identifier value from the Azure portal.
    Single Sign On Url The Login URL value from the Azure portal.
    Certificate The contents of the downloaded Certificate (Base64) file from the Azure portal. Use Notepad to view and copy.

    You might also upload the Federation Metadata XML by selecting the Upload Metadata option.

  4. Select Save.

Create a Catchpoint test user

Catchpoint supports just-in-time user provisioning, which is enabled by default. You have no action items in this section. If B.Simon doesn't already exist as a user in Catchpoint, it's created after authentication.

Test SSO

In this section, you test your Azure AD single sign-on configuration with following options.

SP initiated:

  • Click on Test this application in Azure portal. This will redirect to Catchpoint Sign on URL where you can initiate the login flow.

  • Go to Catchpoint Sign-on URL directly and initiate the login flow from there.

IDP initiated:

  • Click on Test this application in Azure portal and you should be automatically signed in to the Catchpoint for which you set up the SSO

You can also use Microsoft My Apps to test the application in any mode. When you click the Catchpoint tile in the My Apps, if configured in SP mode you would be redirected to the application sign on page for initiating the login flow and if configured in IDP mode, you should be automatically signed in to the Catchpoint for which you set up the SSO. For more information about the My Apps, see Introduction to the My Apps.


When you're signed in to the Catchpoint application through the login page, after providing Catchpoint Credentials, enter the valid Namespace value in the Company Credentials(SSO) field and select Login.

Catchpoint configuration

Next steps

After you configure Catchpoint, you can enforce session control. This precaution protects against exfiltration and infiltration of your organization's sensitive data in real time. Session control is an extension of Conditional Access. Learn how to enforce session control with Microsoft Defender for Cloud Apps.