Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
In this article, you learn how to integrate Nulab Pass (Backlog, Cacoo, and Typetalk) with Microsoft Entra ID. By integrating, you can:
- Control in Microsoft Entra ID who has access to Nulab Pass in Microsoft Entra ID.
- Enable users to be automatically signed in to Nulab Pass with their Microsoft Entra accounts.
- Manage your accounts in one central location.
Prerequisites
The scenario outlined in this article assumes that you already have the following prerequisites:
- A Microsoft Entra user account with an active subscription. If you don't already have one, you can Create an account for free.
- One of the following roles:
- Nulab Pass SSO-enabled subscription.
Scenario description
In this article, you’ll configure and test Microsoft Entra SSO in a test environment. Nulab Pass supports both SP and IDP-initiated SSO.
Add Nulab Pass from the gallery
To configure the integration of Nulab Pass into Microsoft Entra ID, add Nulab Pass from the gallery to your list of managed SaaS apps.
- Go to Entra ID > Enterprise apps > New application.
- In the Add from the gallery section, type Nulab Pass in the search box.
- Select Nulab Pass from results panel and add the app.
- Wait a few seconds while the app is added to your tenant.
Alternatively, you can also use the Enterprise App Configuration Wizard. In this wizard, you can add an application to your tenant, add users/groups to the app, assign roles, and walk through the SSO configuration as well. Learn more about Microsoft 365 wizards.
Configure and test Microsoft Entra SSO for Nulab Pass
Configure and test Microsoft Entra SSO with Nulab Pass using a test user called B.Simon. For SSO to work, you need to establish a link relationship between a Microsoft Entra user and the related user in Nulab Pass.
To configure and test Microsoft Entra SSO with Nulab Pass:
- Configure Microsoft Entra SSO to enable your users to use this feature.
- Create a Microsoft Entra test user to test Microsoft Entra SSO with B.Simon.
- Assign the Microsoft Entra test user to enable B.Simon to use Microsoft Entra SSO.
- Configure Nulab Pass SSO to configure the SSO settings on the application side.
- Create Nulab Pass test user to have a counterpart of B.Simon in Nulab Pass that’s linked to the Microsoft Entra representation of user.
- Test SSO to verify whether the configuration works.
Configure Microsoft Entra SSO
To enable Microsoft Entra SSO:
Sign in to the Microsoft Entra admin center as at least a Cloud Application Administrator.
Go to Entra ID > Enterprise apps > Nulab Pass (Backlog,Cacoo,Typetalk) > Single sign-on.
On the Select a single sign-on method page, select SAML.
On the Set up single sign-on with SAML page, select the pencil icon for Basic SAML Configuration to edit the settings.
In the Basic SAML Configuration section, perform the following steps:
a. In the Identifier text box, type a URL using the following pattern:
https://apps.nulab.com/signin/spaces/<Space_Key>/saml
b. In the Reply URL text box, type a URL using the following pattern:
https://apps.nulab.com/signin/spaces/<Space_Key>/saml/callback
Perform the following step to configure the application in SP initiated mode:
In the Sign on URL text box, type the URL:
https://apps.nulab.com/signin
Note
These values aren't real and should be updated with the actual Identifier, Reply URL, and Sign on URL found in your Nulab Pass organization settings. In your organization settings:
- Select Single Sign-On from the menu on the left.
- Press the Manage button to display the Manage SAML authentication dialog.
- Copy SP Entity ID and SP Endpoint URL (ACS) values and paste in the Entra side configuration.
- For more information, please refer how to set up SAML authentication documentation.
Your Nulab Pass application expects the SAML assertions in a specific format, which requires you to add custom attribute mappings to your SAML token attributes configuration. The following screenshot shows an example for this. The default value of Unique User Identifier is user.userprincipalname, but Nulab Pass expects this to be mapped with the user's email. Use the user.mail attribute from the list or the appropriate attribute value based on your organization configuration.
On the Set up single sign-on with SAML page in the SAML Signing Certificate section, you find the Certificate (Base64). Select Download to download the certificate and save it on your computer.
In the Set up Nulab Pass section, copy the appropriate URL(s) based on your requirement.
Create and assign Microsoft Entra test user
Follow the guidelines in the create and assign a user account quickstart to create a test user account called B.Simon.
Configure Nulab Pass SSO
You must configure Domain authentication before configure SSO.
To configure SSO in Nulab Pass, set the Certificate (Base64) and URLs from the application configuration to ensure that the SSO connection is set on both sides. To do this:
- Go to your Nulab Pass organization settings.
- Select Single Sign-On from the menu on the left.
- Press the Manage button to display the Manage SAML authentication dialog.
- Enter the following:
- IdP Entity ID
- IdP Endpoint URL
- X.509 Certificate (Base64)
Please refer how to set up SAML authentication documentation for more details.
Create Nulab Pass test user
Next, you’ll create a user called Britta Simon
in Nulab Pass by adding a Managed Account. Users must be created and activated before you use SSO.
Test SSO
Now, you’ll test your Microsoft Entra SSO configuration using one of the following options:
SP initiated:
Select Test this application to be redirected to Nulab Pass to sign in.
Or, go to the Nulab Pass sign in page directly and initiate the flow from there.
IDP initiated:
- Select Test this application to be automatically signed in to SSO-enabled Nulab Pass.
You can also use Microsoft My Apps to test the application in any mode. When you select the Nulab Pass tile in My Apps, you’ll be redirected to the application sign on page for initiating the login flow if it was configured in SP mode. If configured in IDP mode, you’ll be automatically signed in to SSO-enabled Nulab Pass. Learn more about My Apps.
Related content
With Nulab Pass configured, you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access. Learn how to enforce session control with Microsoft Defender for Cloud Apps.