Skip to main content
Matrix42 Self-Service Help Center

Identity Provider Integration II: Microsoft Entra ID

Microsoft Entra ID

Microsoft Entra ID (formerly Azure Active Directory) is a cloud-based identity and access management service that provides secure authentication, single sign-on (SSO), and access control for users, applications, and resources in both on-premises and cloud environments. This section provides a step-by-step guide on configuring Microsoft Entra ID to configure authentication via SAML 2.0 and use the configuration in Silverback. The goal is to provide users with a seamless and secure authentication experience using their existing Microsoft Entra ID credentials. To use SAML 2.0 with Microsoft Entra ID, you must first integrate the Silverback application with your Microsoft Entra ID, configure your Silverback URLs, assign your permitted user, and then import the configuration into Silverback.

Search and add Silverback application

  • Login to https://portal.azure.com as an administrator
  • Navigate to Microsoft Entra ID
  • Navigate to Enterprise Applications
  • Click +New application
  • Search for Silverback
  • Select Silverback
  • Click Create
  • Wait until the application will be opened

Set up single sign on

  • Click Get started on Set up single sign on
  • Select SAML
  • Click the Edit Button for Basic SAML Configuration
  • Under Identifier (Entity ID), press Add identifier and enter your Silverback URL without https (e.g. silverback.company.com) - ignore in case the pattern example
  • Under Reply URL, press Add replay URL and add your Silverback URL in the following format: https://silverback.company.com/sts/authorize/login
  • Under Sign on URL, enter your Silverback URL in the following format https://silverback.company.com/ssp
  • Click Save
  • Click X to Close
  • Select No, I'll test later

Review Claims and Copy Metadata

  • Review under Attributes & Claims the Name attribute. It should be set automatically to user.userprincipalname. This Attribute will be used later on in Silverback and is important for a Co-existence with an active LDAP connection in Silverback.

When you click the edit button at Attributes & Claims , you can review the responsible Claim (Schema - http://schemas.xmlsoap.org/ws/2005/0...ty/claims/name) for Name

  • Copy the App Federation Metadata to your Clipboard (Click to Copy)

Grant Access for Users

  • Navigate to Users and groups
  • Press + Add user/group
  • Under Users and group, press None selected
  • Search and/or select all Users and Groups you want to grant access
  • Click Select
  • Confirm with Assign
  • Was this article helpful?