Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
In this article, you learn how to integrate AwareGo with Microsoft Entra ID. When you integrate AwareGo with Microsoft Entra ID, you can:
- Control in Microsoft Entra ID who has access to AwareGo.
- Enable your users to be automatically signed in to AwareGo with their Microsoft Entra accounts.
- Manage your accounts in one central location, the Azure portal.
Prerequisites
The scenario outlined in this article assumes that you already have the following prerequisites:
- A Microsoft Entra user account with an active subscription. If you don't already have one, you can Create an account for free.
- One of the following roles:
- An AwareGo single sign-on (SSO)-enabled subscription.
Scenario description
In this article, you configure and test Microsoft Entra SSO in a test environment. AwareGo supports a service provider (SP)-initiated SSO.
Adding AwareGo from the gallery
To configure the integration of AwareGo into Microsoft Entra ID, you need to add AwareGo from the gallery to your list of managed software as a service (SaaS) apps.
- Sign in to the Microsoft Entra admin center as at least a Cloud Application Administrator.
- Browse to Entra ID > Enterprise apps > New application.
- In the Add from the gallery section, type AwareGo in the search box.
- In the results pane, select AwareGo, and then add the app. In a few seconds, the app is added to your tenant.
Configure and test Microsoft Entra SSO for AwareGo
Configure and test Microsoft Entra SSO with AwareGo by using a test user called B.Simon. For SSO to work, you need to establish a link relationship between a Microsoft Entra user and the related user in AwareGo.
To configure and test Microsoft Entra SSO with AwareGo, do the following:
Configure Microsoft Entra SSO to enable your users to use this feature.
a. Create a Microsoft Entra test user to test Microsoft Entra single sign-on with user B.Simon.
b. Assign the Microsoft Entra test user to enable user B.Simon to use Microsoft Entra single sign-on.Configure AwareGo SSO to configure the single sign-on settings on the application side.
a. Create an AwareGo test user to have a counterpart of B.Simon in AwareGo that's linked to the Microsoft Entra representation of the user.
b. Test SSO to verify that the configuration works.
Configure Microsoft Entra SSO
To enable Microsoft Entra SSO in the Azure portal, do the following:
Sign in to the Microsoft Entra admin center as at least a Cloud Application Administrator.
Browse to Entra ID > Enterprise apps > AwareGo application integration page, under Manage, select single sign-on.
On the Select a single sign-on method page, select SAML.
To edit the settings, on the Set up Single Sign-On with SAML pane, select the Edit button.
On the edit pane, under Basic SAML Configuration, do the following:
a. In the Sign on URL box, enter either of the following URLs:
https://lms.awarego.com/auth/signin/
https://my.awarego.com/auth/signin/
b. In the Identifier (Entity ID) box, enter a URL in the following format:
https://<SUBDOMAIN>.awarego.com
c. In the Reply URL box, enter a URL in the following format:
https://<SUBDOMAIN>.awarego.com/auth/sso/callback
Note
The preceding values aren't real. Update them with the actual identifier and reply URLs. To obtain the values, contact the AwareGo client support team. You can also refer to the examples in the Basic SAML Configuration section.
On the Set up single sign-on with SAML page, in the SAML Signing Certificate section, next to Certificate (Base64), select Download to download the certificate and save it to your computer.
In the Set up AwareGo section, copy one or more URLs, depending on your requirements.
Create and assign Microsoft Entra test user
Follow the guidelines in the create and assign a user account quickstart to create a test user account called B.Simon.
Configure AwareGo SSO
To configure single sign-on on the AwareGo side, send the Certificate (Base64) certificate you downloaded earlier and the URLs you copied earlier to the AwareGo support team. The support team creates this setting to establish the SAML SSO connection properly on both sides.
Create an AwareGo test user
In this section, you create a user called Britta Simon in AwareGo. Work with the AwareGo support team to add the users in the AwareGo platform. You must create and activate the users before you can use single sign-on.
Test SSO
In this section, you can test your Microsoft Entra single sign-on configuration by doing any of the following:
In the Azure portal, select Test this application. This redirects you to the AwareGo sign-in page, where you can initiate the sign-in flow.
Go to the AwareGo sign-in page directly, and initiate the sign-in flow from there.
Go to Microsoft My Apps. When you select the AwareGo tile in My Apps, you're redirected to the AwareGo sign-in page. For more information, see Sign in and start apps from the My Apps portal.
Related content
After you've configured AwareGo, you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access App Control. For more information, see Learn how to enforce session control with Microsoft Defender for Cloud Apps.