Edit

Share via


Configure AwareGo for Single sign-on with Microsoft Entra ID

In this article, you learn how to integrate AwareGo with Microsoft Entra ID. When you integrate AwareGo with Microsoft Entra ID, you can:

  • Control in Microsoft Entra ID who has access to AwareGo.
  • Enable your users to be automatically signed in to AwareGo with their Microsoft Entra accounts.
  • Manage your accounts in one central location, the Azure portal.

Prerequisites

The scenario outlined in this article assumes that you already have the following prerequisites:

  • An AwareGo single sign-on (SSO)-enabled subscription.

Scenario description

In this article, you configure and test Microsoft Entra SSO in a test environment. AwareGo supports a service provider (SP)-initiated SSO.

To configure the integration of AwareGo into Microsoft Entra ID, you need to add AwareGo from the gallery to your list of managed software as a service (SaaS) apps.

  1. Sign in to the Microsoft Entra admin center as at least a Cloud Application Administrator.
  2. Browse to Entra ID > Enterprise apps > New application.
  3. In the Add from the gallery section, type AwareGo in the search box.
  4. In the results pane, select AwareGo, and then add the app. In a few seconds, the app is added to your tenant.

Configure and test Microsoft Entra SSO for AwareGo

Configure and test Microsoft Entra SSO with AwareGo by using a test user called B.Simon. For SSO to work, you need to establish a link relationship between a Microsoft Entra user and the related user in AwareGo.

To configure and test Microsoft Entra SSO with AwareGo, do the following:

  1. Configure Microsoft Entra SSO to enable your users to use this feature.

    a. Create a Microsoft Entra test user to test Microsoft Entra single sign-on with user B.Simon.
    b. Assign the Microsoft Entra test user to enable user B.Simon to use Microsoft Entra single sign-on.

  2. Configure AwareGo SSO to configure the single sign-on settings on the application side.

    a. Create an AwareGo test user to have a counterpart of B.Simon in AwareGo that's linked to the Microsoft Entra representation of the user.
    b. Test SSO to verify that the configuration works.

Configure Microsoft Entra SSO

To enable Microsoft Entra SSO in the Azure portal, do the following:

  1. Sign in to the Microsoft Entra admin center as at least a Cloud Application Administrator.

  2. Browse to Entra ID > Enterprise apps > AwareGo application integration page, under Manage, select single sign-on.

  3. On the Select a single sign-on method page, select SAML.

  4. To edit the settings, on the Set up Single Sign-On with SAML pane, select the Edit button.

    Screenshot of the Edit button for Basic SAML Configuration.

  5. On the edit pane, under Basic SAML Configuration, do the following:

    a. In the Sign on URL box, enter either of the following URLs:

    • https://lms.awarego.com/auth/signin/
    • https://my.awarego.com/auth/signin/

    b. In the Identifier (Entity ID) box, enter a URL in the following format: https://<SUBDOMAIN>.awarego.com

    c. In the Reply URL box, enter a URL in the following format: https://<SUBDOMAIN>.awarego.com/auth/sso/callback

    Note

    The preceding values aren't real. Update them with the actual identifier and reply URLs. To obtain the values, contact the AwareGo client support team. You can also refer to the examples in the Basic SAML Configuration section.

  6. On the Set up single sign-on with SAML page, in the SAML Signing Certificate section, next to Certificate (Base64), select Download to download the certificate and save it to your computer.

    Screenshot of the certificate "Download" link on the SAML Signing Certificate pane.

  7. In the Set up AwareGo section, copy one or more URLs, depending on your requirements.

    Screenshot of the "Set up AwareGo" pane for copying configuration URLs.

Create and assign Microsoft Entra test user

Follow the guidelines in the create and assign a user account quickstart to create a test user account called B.Simon.

Configure AwareGo SSO

To configure single sign-on on the AwareGo side, send the Certificate (Base64) certificate you downloaded earlier and the URLs you copied earlier to the AwareGo support team. The support team creates this setting to establish the SAML SSO connection properly on both sides.

Create an AwareGo test user

In this section, you create a user called Britta Simon in AwareGo. Work with the AwareGo support team to add the users in the AwareGo platform. You must create and activate the users before you can use single sign-on.

Test SSO

In this section, you can test your Microsoft Entra single sign-on configuration by doing any of the following:

  • In the Azure portal, select Test this application. This redirects you to the AwareGo sign-in page, where you can initiate the sign-in flow.

  • Go to the AwareGo sign-in page directly, and initiate the sign-in flow from there.

  • Go to Microsoft My Apps. When you select the AwareGo tile in My Apps, you're redirected to the AwareGo sign-in page. For more information, see Sign in and start apps from the My Apps portal.

After you've configured AwareGo, you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access App Control. For more information, see Learn how to enforce session control with Microsoft Defender for Cloud Apps.