Tutorial: Integrate Microsoft Entra single sign-on (SSO) with Splan Visitor
In this tutorial, you'll learn how to integrate Splan Visitor with Microsoft Entra ID. When you integrate Splan Visitor with Microsoft Entra ID, you can:
- Use Microsoft Entra ID to control who has access to Splan Visitor.
- Enable users to be automatically signed in to Splan Visitor with their Microsoft Entra accounts.
- Manage your accounts in one central location, the Azure portal.
Prerequisites
To get started, you need:
- A Microsoft Entra subscription. If you don't have a subscription, you can get a free account.
- A Splan Visitor single sign-on (SSO) enabled subscription.
Note
This integration is also available to use from Microsoft Entra US Government Cloud environment. You can find this application in the Microsoft Entra US Government Cloud Application Gallery and configure it in the same way as you do from public cloud.
Scenario description
In this tutorial, you'll configure and test Microsoft Entra SSO in a test environment.
- Splan Visitor supports IdP-initiated SSO.
Add Splan Visitor from the gallery
To configure the integration of Splan Visitor into Microsoft Entra ID, add Splan Visitor from the gallery to your list of managed SaaS apps.
- Sign in to the Microsoft Entra admin center as at least a Cloud Application Administrator.
- Browse to Identity > Applications > Enterprise applications > New application.
- In the Add from the gallery section, enter Splan Visitor in the search box.
- Select Splan Visitor from the results panel, and then add the app. Wait a few seconds while the app is added to your tenant.
Alternatively, you can also use the Enterprise App Configuration Wizard. In this wizard, you can add an application to your tenant, add users/groups to the app, assign roles, as well as walk through the SSO configuration as well. Learn more about Microsoft 365 wizards.
Configure and test Microsoft Entra SSO for Splan Visitor
Configure and test Microsoft Entra SSO with Splan Visitor by using a test user named B.Simon. For SSO to work, you need to establish a link relationship between a Microsoft Entra user and the related user in Splan Visitor.
To configure and test Microsoft Entra SSO with Splan Visitor, perform the following steps:
- Configure Microsoft Entra SSO to enable your users to use this feature.
- Create a Microsoft Entra test user to test Microsoft Entra single sign-on with test user B.Simon.
- Assign the Microsoft Entra test user to enable B.Simon to use Microsoft Entra single sign-on.
- Configure Splan Visitor SSO to configure the single sign-on settings with Splan Visitor.
- Create a Splan Visitor test user to have a counterpart of B.Simon in Splan Visitor that is linked to the Microsoft Entra representation of user.
- Test SSO to verify whether the configuration works.
Configure Microsoft Entra SSO
Follow these steps to enable Microsoft Entra SSO in the Azure portal:
Sign in to the Microsoft Entra admin center as at least a Cloud Application Administrator.
Browse to Identity > Applications > Enterprise applications > Splan Visitor > Single sign-on.
On the Select a single sign-on method page, select SAML.
On the Set up Single Sign-On with SAML page, select the pencil icon for Basic SAML Configuration to edit the settings.
In the Basic SAML Configuration section, the application is preconfigured and the necessary URLs are prepopulated with Azure. Select the Save button to save the configuration.
On the Set up Single Sign-on with SAML page, in the SAML Signing Certificate section, find Federation Metadata XML. Select Download to download the certificate and save it to your computer.
On the Set up Splan Visitor section, copy the appropriate URL or URLs based on your requirement.
Create a Microsoft Entra test user
In this section, you'll create a test user named B.Simon.
- In the Microsoft Entra admin center, navigate to Identity > Users > All users.
- Select New user at the top of the screen.
- In the User properties, follow these steps:
- In the Name field, enter B.Simon.
- In the User name field, enter your username in username@companydomain.extension format. For example, enter B.Simon@contoso.com.
- Select the Show password check box, and then write down the value that's displayed in the Password box.
- Select Create.
Assign the Microsoft Entra test user
In this section, you'll enable B.Simon to use single sign-on by granting access to Splan Visitor.
- Sign in to the Microsoft Entra admin center as at least a Cloud Application Administrator.
- Browse to Identity > Applications > Enterprise applications > Splan Visitor to open the app overview.
- Find the Manage section, and then select Users and groups.
- Select Add user, and then select Users and groups in the Add Assignment dialog box.
- In the Users and groups dialog box, select B.Simon from the Users list, and then click Select at the bottom of the screen.
- If the user will be assigned a role, select it from the Select a role drop-down menu. If no role has been set up for this app, leave the Default Access role selected.
- In the Add Assignment dialog box, select Assign.
Configure Splan Visitor SSO
To configure single sign-on with Splan Visitor, send the Federation Metadata XML that you downloaded and appropriate copied URLs to the Splan Visitor support team. This ensures that the SAML SSO connection is set properly on both sides.
Create a Splan Visitor test user
Create a test user named Britta Simon in Splan Visitor. Work with the Splan Visitor support team to add the user to Splan Visitor. You must create and activate the user before you use single sign-on.
Test SSO
Test your Microsoft Entra single sign-on configuration with one of the following options:
- Azure portal: Select Test this application to automatically sign in to the Splan Visitor for which you set up SSO.
- Microsoft My Apps portal: Select the Splan Visitor tile to automatically sign in to the Splan Visitor for which you set up SSO. For more information about the My Apps portal, see Sign in and start apps from the My Apps portal.
Next steps
After you configure Splan Visitor, you can learn how to enforce session controls in Microsoft Defender for Cloud Apps. Session controls help protect exfiltration and infiltration of your organization's sensitive data in real time. Session controls extend from Conditional Access.