Azure Active Directory SSO Configuration

SSO for Azure AD

Azure Configuration:

Building a Non-gallery app for Infosec Skills:

  1. Log into your Azure Active Directory https://portal.azure.com.

  2. Navigate to Enterprise applications.
    image

  3. Select New application in the top left corner.
    image

  4. Select Create your own application .
    image

  5. Input a name of your choice for the app such as “Infosec Skills SSO” and select “Integrate any other application you don’t find in the gallery”. On the lower right side of the window click Create to create your own application.
    image

  6. Navigate to Single sign-on and select SAML.
    image

  7. On the Set up Single Sign-On with SAML page, click Edit to open the Basic SAML Configuration dialog.
    image

  8. Input the Metadata URL and ACS URL from the Skills Teams Single Sign-On authentication page then click Save. If prompted to test single sign-on, select No, I’ll test later.

    Note:
    Identifier (Entity ID) will be the Service Provider Metadata URL located in Skills Teams Single Sign-On Page.

    Reply URL (Assertion Consumer Service URL) will be the ACS URL located in Skills Teams Single Sign-On page.

image
image

  1. Back on the Set up Single Sign-On with SAML page, click Edit to open the User Attributes & Claims dialog.
    image

  2. On the User Attributes & Claims page, remove the default additional claims that exist by clicking on the ellipsis to the right of each of them and select Delete.
    image

  3. Add the following additional claims by clicking on Add new claim and inputting the following in each field, then click Save:

  4. Repeat step 11 and add the following 4 claims:

image

  1. Go to properties from the menu on the left under the Manage section and toggle User Assignment Required to Yes.

    Users or groups must first be assigned to this application before being able to access it. To add users or groups, navigate to “Azure Active Directory > Enterprise applications > your application > Users and groups.”

  2. Copy the App Federation Metadata URL from the Set up Single Sign-On with SAML page and paste it into the Identity Provider Metadata URL field on the Infosec Skills Teams SSO page (https://app.infosecinstitute.com/portal/teams/sso/settings), then click green Enable button to Save.

image
image

Optional settings

User assignment

By default, the SSO enterprise app just created in Azure AD has the “user assignment required” option turned off, which means that all users in the directory can access the application. To access this option in the Azure AD portal, navigate to “Azure Active Directory > Enterprise applications > your application > Properties”.

If the “user assignment required” is set to yes, then users or groups must first be assigned to this application before being able to access it. To add users or groups, navigate to “Azure Active Directory > Enterprise applications > your application > Users and groups.”