Microsoft Entra single sign-on integration with AwareGo
Article
In this article, you'll learn how to integrate AwareGo with Microsoft Entra ID. When you integrate AwareGo with Microsoft Entra ID, you can:
Control in Microsoft Entra ID who has access to AwareGo.
Enable your users to be automatically signed in to AwareGo with their Microsoft Entra accounts.
Manage your accounts in one central location, the Azure portal.
Prerequisites
To get started, you need the following items:
A Microsoft Entra subscription. If you don't have a subscription, you can get a free account.
An AwareGo single sign-on (SSO)-enabled subscription.
Scenario description
In this article, you configure and test Microsoft Entra SSO in a test environment. AwareGo supports a service provider (SP)-initiated SSO.
Adding AwareGo from the gallery
To configure the integration of AwareGo into Microsoft Entra ID, you need to add AwareGo from the gallery to your list of managed software as a service (SaaS) apps.
Browse to Identity > Applications > Enterprise applications > New application.
In the Add from the gallery section, type AwareGo in the search box.
In the results pane, select AwareGo, and then add the app. In a few seconds, the app is added to your tenant.
Configure and test Microsoft Entra SSO for AwareGo
Configure and test Microsoft Entra SSO with AwareGo by using a test user called B.Simon. For SSO to work, you need to establish a link relationship between a Microsoft Entra user and the related user in AwareGo.
To configure and test Microsoft Entra SSO with AwareGo, do the following:
Configure AwareGo SSO to configure the single sign-on settings on the application side.
a. Create an AwareGo test user to have a counterpart of B.Simon in AwareGo that's linked to the Microsoft Entra representation of the user.
b. Test SSO to verify that the configuration works.
Configure Microsoft Entra SSO
To enable Microsoft Entra SSO in the Azure portal, do the following:
Browse to Identity > Applications > Enterprise applications > AwareGo application integration page, under Manage, select single sign-on.
On the Select a single sign-on method page, select SAML.
To edit the settings, on the Set up Single Sign-On with SAML pane, select the Edit button.
On the edit pane, under Basic SAML Configuration, do the following:
a. In the Sign on URL box, enter either of the following URLs:
https://lms.awarego.com/auth/signin/
https://my.awarego.com/auth/signin/
b. In the Identifier (Entity ID) box, enter a URL in the following format: https://<SUBDOMAIN>.awarego.com
c. In the Reply URL box, enter a URL in the following format: https://<SUBDOMAIN>.awarego.com/auth/sso/callback
Note
The preceding values are not real. Update them with the actual identifier and reply URLs. To obtain the values, contact the AwareGo client support team. You can also refer to the examples in the Basic SAML Configuration section.
On the Set up single sign-on with SAML page, in the SAML Signing Certificate section, next to Certificate (Base64), select Download to download the certificate and save it to your computer.
In the Set up AwareGo section, copy one or more URLs, depending on your requirements.
Create a Microsoft Entra test user
In this section, you create a test user called B.Simon.
Select New user > Create new user, at the top of the screen.
In the User properties, follow these steps:
In the Display name field, enter B.Simon.
In the User principal name field, enter the username@companydomain.extension. For example, B.Simon@contoso.com.
Select the Show password check box, and then write down the value that's displayed in the Password box.
Select Review + create.
Select Create.
Assign the Microsoft Entra test user
In this section, you enable user B.Simon to use Azure SSO by granting access to AwareGo.
Browse to Identity > Applications > Enterprise applications.
In the Applications list, select AwareGo.
On the app overview page, in the Manage section, select Users and groups.
Select Add user and then, on the Add Assignment pane, select Users and groups.
On the Users and groups pane, in the Users list, select B.Simon, and then select the Select button.
If you're expecting to assign a role to the users, you can select it in the Select a role drop-down list. If no role has been set up for this app, the Default Access role is selected.
On the Add Assignment pane, select the Assign button.
Configure AwareGo SSO
To configure single sign-on on the AwareGo side, send the Certificate (Base64) certificate you downloaded earlier and the URLs you copied earlier to the AwareGo support team. The support team creates this setting to establish the SAML SSO connection properly on both sides.
Create an AwareGo test user
In this section, you create a user called Britta Simon in AwareGo. Work with the AwareGo support team to add the users in the AwareGo platform. You must create and activate the users before you can use single sign-on.
Test SSO
In this section, you can test your Microsoft Entra single sign-on configuration by doing any of the following:
In the Azure portal, select Test this application. This redirects you to the AwareGo sign-in page, where you can initiate the sign-in flow.
Go to the AwareGo sign-in page directly, and initiate the sign-in flow from there.
Go to Microsoft My Apps. When you select the AwareGo tile in My Apps, you're redirected to the AwareGo sign-in page. For more information, see Sign in and start apps from the My Apps portal.
Related content
After you've configured AwareGo, you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access App Control. For more information, see Learn how to enforce session control with Microsoft Defender for Cloud Apps.
Discover how Microsoft Entra External ID can provide secure, seamless sign-in experiences for your consumers and business customers. Explore tenant creation, app registration, flow customization, and account security.