arrow-left

All pages
gitbookPowered by GitBook
1 of 1

Loading...

Microsoft Entra ID

Configure Microsoft Entra ID as an Identity Provider for CISO Assistant

Go into your Azure portal home

  1. Open the sidebar menu and click on Microsoft Entra ID

  2. Click on Add button > Entreprise application

  3. Click on Create your own application

  4. Enter a name and then click Integrate any other application you don’t find in the gallery (Non-gallery)

  5. Click on Single sign-on from the sidebar menu or on Set up single sign on bellow Getting Started and choose SAML

  6. In the first box Basic SAML Configuration, specify the Entity ID, it has to be the same than SP Entity ID in CISO Assistant (see next screenshot)

  7. Add the Reply URL: <base_url>/api/accounts/saml/0/acs/ (for example with localhost: https://localhost:8443/api/accounts/saml/0/acs/)

  8. In the third box SAML Certificates, copy the App Federation Metadata Url as it is the Metadata URL in CISO Assistant (see next screenshot)

  9. In the fourth box Set up <App_name>, copy the Microsoft Entra Identifier as it is the IdP Entity ID in CISO Assistant

  10. Make sure you use the same Identifier (Entity ID) that you've set earlier and appear on block 1, on CISO Assistant SP Entity ID:

  11. Click on Users and groups in the sidebar menu, and Add user/group to give them access to CISO Assistant with SSO. The matching key will be the email and you'll be able to grant their permissions on the applications.

  12. You can now with the 3 parameters you've retrieved.

hashtag
1. Introduction

Go to your Microsoft Azure Portal

hashtag
2. Navigate to App Registrations

circle-exclamation

Adding a user in your Entra application doesn't automatically create the user on CISO Assistant

Click the App registrations section to add a new application for OIDC configuration. You can also use the search bar if you don't find it in the suggestions.

hashtag
3. Start New Application Registration

hashtag
4. Name your application

hashtag
5. Select Web Platform in Redirect URI options

hashtag
6. Enter the callback URL of your instance

The callback URL is: <ciso_assistant_url>/api/accounts/oidc/openid_connect/login/callback/ for

for instance, for localhost: http://localhost:8000/api/accounts/oidc/openid_connect/login/callback/

hashtag
7. Complete Application Registration

hashtag
8. Copy the Application Client ID

hashtag
9. Past it into the Client ID field

hashtag
10. Open Certificates & Secrets

hashtag
11. Create a New Client Secret

hashtag
12. Add your Client Secret

hashtag
13. Copy the fresh Client Secret Value

hashtag
14. Past it into the Secret field

hashtag
15. Go back to your App Overview

hashtag
16. Inside Endpoints copy the OpenID Connect metadata URL

hashtag
17. Paste it into the Server URL field

hashtag
18. Save your configuration

circle-check

You have successfully configured OpenID Connect (OIDC) integration with EntraID.

configure CISO Assistant
Introduction
Navigate to App Registrations
Start New Application Registration
Name your application
Select Web Platform in Redirect URI options
Enter the callback URL of your instance
Complete Application Registration
Copy the Application Client ID
Past it into the Client ID field
Open Certificates & Secrets
Create a New Client Secret
Add your Client Secret
Copy the fresh Client Secret Value
Past it into the Secret field
Go back to your App Overview
Inside Endpoints copy the OpenID Connect metadata URL
Paste it into the Server URL field
Save your configuration