Skip to main content
Matrix42 Self-Service Help Center

Identity Provider Integration II: Microsoft Entra ID

Microsoft Entra ID

Microsoft Entra ID (formerly Azure Active Directory) is a cloud-based identity and access management service that provides secure authentication, single sign-on (SSO), and access control for users, applications, and resources in both on-premises and cloud environments. This section provides a step-by-step guide on configuring Microsoft Entra ID to configure authentication via SAML 2.0 and use the configuration in Silverback. The goal is to provide users with a seamless and secure authentication experience using their existing Microsoft Entra ID credentials. To use SAML 2.0 with Microsoft Entra ID, you must first integrate the Silverback application with your Microsoft Entra ID, configure your Silverback URLs, assign your permitted user, and then import the configuration into Silverback.

Search and add Silverback application

  • Login to https://portal.azure.com as an administrator
  • Navigate to Microsoft Entra ID
  • Navigate to Enterprise Applications
  • Click +New application
  • Search for Silverback
  • Select Silverback
  • Click Create
  • Wait until the application will be opened

Set up single sign on

  • Click Get started on Set up single sign on
  • Select SAML
  • Click the Edit Button for Basic SAML Configuration
  • Under Identifier (Entity ID), press Add identifier and enter your Silverback URL without https (e.g. silverback.company.com) - ignore in case the pattern example
  • Under Reply URL, press Add replay URL and add your Silverback URL in the following format: https://silverback.company.com/sts/authorize/login
  • Under Sign on URL, enter your Silverback URL in the following format https://silverback.company.com/ssp
  • Click Save
  • Click X to Close
  • Select No, I'll test later

Review Claims

  • Review under Attributes & Claims the Name attribute. It should be set automatically to user.userprincipalname. This Attribute will be used later on in Silverback and is important for a Co-existence with an active LDAP connection in Silverback.

When you click the edit button at Attributes & Claims , you can review the responsible Claim (Schema - http://schemas.xmlsoap.org/ws/2005/0...ty/claims/name) for Name

Copy Metadata

  • Locate the SAML Certificates section
  • Copy the App Federation Metadata Url to your Clipboard (Click to Copy)

Review the expiration date of the certificate. You will be notified by Microsoft when the expiration date is approaching. When the certificate has expired or is close to expiry, press Edit in the SAML Certifications section and then press + New Certificate. Then press *** and set the certificate to active. Then copy the App Federation Metadata URL again and import it to Silverback as highlighted in Next Steps.

Grant Access for Users

  • Navigate to Users and groups
  • Press + Add user/group
  • Under Users and group, press None selected
  • Search and/or select all Users and Groups you want to grant access
  • Click Select
  • Confirm with Assign
  • Was this article helpful?