In this article, you learn how to integrate VEDA Cloud with Microsoft Entra ID. This application enables Microsoft Entra ID to act as SAML IdP for authenticating users to your VEDA HR Cloud Solutions. When you integrate VEDA Cloud with Microsoft Entra ID, you can:
Control in Microsoft Entra ID who has access to VEDA Cloud.
Enable your users to be automatically signed-in to VEDA Cloud with their Microsoft Entra accounts.
Manage your accounts in one central location.
You configure and test Microsoft Entra single sign-on for VEDA Cloud in a test environment. VEDA Cloud supports SP initiated single sign-on.
Prerequisites
To integrate Microsoft Entra ID with VEDA Cloud, you need:
A Microsoft Entra subscription. If you don't have a subscription, you can get a free account.
VEDA Cloud single sign-on (SSO) enabled subscription.
Add application and assign a test user
Before you begin the process of configuring single sign-on, you need to add the VEDA Cloud application from the Microsoft Entra gallery. You need a test user account to assign to the application and test the single sign-on configuration.
Add VEDA Cloud from the Microsoft Entra gallery
Add VEDA Cloud from the Microsoft Entra application gallery to configure single sign-on with VEDA Cloud. For more information on how to add application from the gallery, see the Quickstart: Add application from the gallery.
c. In the Sign on URL textbox, type a URL using the following pattern:
https://<DOMAIN>.veda.net/<INSTANCE>
Note
These values are not real. Update these values with the actual Identifier, Reply URL and Sign on URL. Contact VEDA Cloud Client support team to get these values. You can also refer to the patterns shown in the Basic SAML Configuration section.
VEDA Cloud application expects the SAML assertions in a specific format, which requires you to add custom attribute mappings to your SAML token attributes configuration. The following screenshot shows the list of default attributes.
In addition to above, VEDA Cloud application expects few more attributes to be passed back in SAML response, which are shown. These attributes are also pre populated but you can review them as per your requirements.
Name
Source Attribute
displayname
user.displayname
On the Set up single sign-on with SAML page, in the SAML Signing Certificate section, click copy button to copy App Federation Metadata Url and save it on your computer.
Configure VEDA Cloud SSO
To configure single sign-on on VEDA Cloud side, you need to send the App Federation Metadata Url to VEDA Cloud support team. They set this setting to have the SAML SSO connection set properly on both sides.
Create VEDA Cloud test user
In this section, you create a user called Britta Simon at VEDA Cloud. Work with VEDA Cloud support team to add the users in the VEDA Cloud platform. Users must be created and activated before you use single sign-on.
Test SSO
In this section, you test your Microsoft Entra single sign-on configuration with following options.
Click on Test this application, this will redirect to VEDA Cloud Sign-on URL where you can initiate the login flow.
Go to VEDA Cloud Sign-on URL directly and initiate the login flow from there.
You can use Microsoft My Apps. When you click the VEDA Cloud tile in the My Apps, this will redirect to VEDA Cloud Sign-on URL. For more information, see Microsoft Entra My Apps.
Once you configure VEDA Cloud you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access. Learn how to enforce session control with Microsoft Cloud App Security.
Deploying and monitoring enterprise applications to Azure solutions can ensure security. Explore how to deploy on-premises and cloud based apps to users.