Tutorial: Microsoft Entra single sign-on (SSO) integration with SiteIntel
In this tutorial, you'll learn how to integrate SiteIntel with Microsoft Entra ID. When you integrate SiteIntel with Microsoft Entra ID, you can:
- Control in Microsoft Entra ID who has access to SiteIntel.
- Enable your users to be automatically signed in to SiteIntel with their Microsoft Entra accounts.
- Manage your accounts in one central location, the Azure portal.
To learn more about software as a service (SaaS) app integration with Microsoft Entra ID, see What is application access and single sign-on with Microsoft Entra ID?.
Prerequisites
To get started, you need the following items:
- A Microsoft Entra subscription. If you don't have a subscription, you can get a free account.
- SiteIntel single sign-on (SSO)-enabled subscription.
Scenario description
In this tutorial, you configure and test Microsoft Entra SSO in a test environment.
- SiteIntel supports SP-initiated and IdP-initiated SSO.
- After you configure SiteIntel, you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access. Learn how to enforce session control with Microsoft Defender for Cloud Apps.
Add SiteIntel from the gallery
To configure the integration of SiteIntel into Microsoft Entra ID, you need to add SiteIntel from the gallery to your list of managed SaaS apps.
- Sign in to the Microsoft Entra admin center as at least a Cloud Application Administrator.
- Browse to Identity > Applications > Enterprise applications > New application.
- In the Add from the gallery box, enter SiteIntel.
- In the results list, select SiteIntel, and then add the app. Wait a few seconds while the app is added to your tenant.
Alternatively, you can also use the Enterprise App Configuration Wizard. In this wizard, you can add an application to your tenant, add users/groups to the app, assign roles, as well as walk through the SSO configuration as well. Learn more about Microsoft 365 wizards.
Configure and test Microsoft Entra single sign-on for SiteIntel
Configure and test Microsoft Entra SSO with SiteIntel by using a test user called B.Simon. For SSO to work, you need to establish a link relationship between a Microsoft Entra user and the related user in SiteIntel.
To configure and test Microsoft Entra SSO with SiteIntel, complete the following building blocks:
Configure Microsoft Entra SSO to enable your users to use this feature.
a. Create a Microsoft Entra test user to test Microsoft Entra single sign-on with user B.Simon.
b. Assign the Microsoft Entra test user to enable user B.Simon to use Microsoft Entra single sign-on.
Configure SiteIntel SSO to configure the single sign-on settings on the application side.
- Create a SiteIntel test user to have a counterpart of user B.Simon in SiteIntel that's linked to the Microsoft Entra representation of the user.
Test SSO to verify that the configuration works.
Configure Microsoft Entra SSO
To enable Microsoft Entra SSO in the Azure portal, do the following:
Sign in to the Microsoft Entra admin center as at least a Cloud Application Administrator.
Browse to Identity > Applications > Enterprise applications > SiteIntel application integration page, go to the Manage section, and then select single sign-on.
On the Select a single sign-on method page, select SAML.
On the Set up single sign-on with SAML page, next to Basic SAML Configuration, select Edit (pen icon).
To configure the application in IdP-initiated mode, in the Basic SAML Configuration section, do the following:
a. In the Identifier box, type a URL in the following format:
urn:amazon:cognito:sp:<REGION>_<USERPOOLID>
b. In the Reply URL box, type a URL in the following format:
https://<CLIENT>.auth.siteintel.com/saml2/idpresponse
c. In the Relay State box, type a URL in the following format:
https://<CLIENT>.siteintel.com
To configure the application in SP-initiated mode, select Set additional URLs, and then do the following:
- In the Sign-on URL box, type a URL in the following format:
https://<CLIENT>.siteintel.com
Note
These values are not real. Update them with the actual Identifier, Reply URL, Sign-on URL, and Relay State. To get these values, contact SiteIntel Client support team. You can also refer to the patterns shown in the Basic SAML Configuration section.
- In the Sign-on URL box, type a URL in the following format:
On the Set up single sign-on with SAML page, in the SAML Signing Certificate section, select the Copy button to copy the URL in the App Federation Metadata Url box.
Create a Microsoft Entra test user
In this section, you create a test user called B.Simon.
- Sign in to the Microsoft Entra admin center as at least a User Administrator.
- Browse to Identity > Users > All users.
- Select New user > Create new user, at the top of the screen.
- In the User properties, follow these steps:
- In the Display name field, enter
B.Simon
. - In the User principal name field, enter the username@companydomain.extension. For example,
B.Simon@contoso.com
. - Select the Show password check box, and then write down the value that's displayed in the Password box.
- Select Review + create.
- In the Display name field, enter
- Select Create.
Assign the Microsoft Entra test user
In this section, you enable user B.Simon to use Azure single sign-on by granting access to SiteIntel.
Browse to Identity > Applications > Enterprise applications.
In the Applications list, select SiteIntel.
On the app overview page, in the Manage section, select Users and groups.
Select Add user and then, on the Add Assignment pane, select Users and groups.
On the Users and groups pane, select B.Simon, and then select the Select button at the lower part of the screen.
If you're expecting any role value in the SAML assertion, on the Select Role pane, select the appropriate role for the user from the list, and then select the Select button.
On the Add Assignment pane, select the Assign button.
Configure SiteIntel SSO
To configure single sign-on on the SiteIntel side, send the URL you copied from the App Federation Metadata Url box to the SiteIntel support team. They set this value to establish the SAML SSO connection properly on both sides.
Create a SiteIntel test user
In this section, you create a user called Britta Simon in SiteIntel. Work with SiteIntel support team to add the users in the SiteIntel platform. Users must be created and activated before you use single sign-on.
Test SSO
In this section, you test your Microsoft Entra single sign-on configuration by using the Access Panel.
When you select the SiteIntel tile in the Access Panel, you should be automatically signed in to the SiteIntel for which you set up SSO. For more information about the Access Panel, see Introduction to the Access Panel.
Additional resources
- List of tutorials about how to integrate SaaS apps with Microsoft Entra ID
- What are application access and single sign-on with Microsoft Entra ID?
- What is Conditional Access in Microsoft Entra ID?
- What is session control in Microsoft Defender for Cloud Apps?
- How to protect SiteIntel with advanced visibility and controls
Feedback
Submit and view feedback for