Microsoft Entra ID (formerly Azure AD) (SAML 2.0)
Harmony SASE allows you to authenticate securely by integrating Microsoft Entra ID (formerly Azure AD) with SAML 2.0.
Configure Microsoft Azure Portal
-
Log in to your Microsoft Azure Portal.
-
Navigate to Azure Active Directory in the left pane.
-
Go to Manage > Enterprise applications.
-
Click New application.
-
Click Create your own application.
-
In the What's the name of your app filed, enter a name for your application.
Note - Do not change the default setting.
-
Click Create.
The Microsoft Azure application is created.
-
Click Assign users and groups tile in the Getting Started section.
-
Search for and select the user and group that you want to assign to the application. If you are using Azure AD Free edition, you cannot add groups, add individual users instead.
-
Click Set up single sign on to enable and configure single sign-on for your application.
The Select a single sign-on method window appears.
-
Click SAML.
-
Click Edit in the Basic SAML Configuration tile.
-
Enter these:
-
Identifier -
urn:auth0:perimeter81:{{WORKSPACE}}-oc
where{{WORKSPACE}}
refers to your Harmony SASE workspace name. -
Reply URL (Assertion Consumer Service URL) -
https://auth.perimeter81.com/login/callback?connection={{WORKSPACE}}-oc
where{{WORKSPACE}}
refers to your Harmony SASE workspace name.
-
-
Click Save.
-
Back on the SAML Signing Certificate tile, go to the Certificate (Base64) file and click Download.
The Certificate (Base64) is downloaded. This certificate will be used for configuring the SAML settings for the application.
-
To copy your Login URL, go to the Set up Harmony SASE tile, expand Or, view step-by-step instructions and click .
Configure the Harmony SASE Administrator Portal
-
Log in to the Harmony SASE Administrator Portal with a administrator account.
-
Go to Settings > Identity Providers.
-
Click Add Provider.
The Add identity provider pop-up appears.
-
Select SAML 2.0 Identity Providers and click Continue.
-
In the Sign in URL field, enter the Identity Provider Sign-in URL from your SAML Identity Provider.
Identity Provider
Sign in URL
Generic SAML
Identity Provider Sign in URL
Active Directory Federation Services (AD FS)
https://{{Your ADFS Domain}}/adfs/ls
Auth0
Auth0 login URL
OneLogin
SAML 2.0 Endpoint (HTTP) value
PingOne
https://sso.connect.pingidentity.com/sso/idp/SSO.saml2?idpid={{idpid}}
PingFederate
https://sso.{{Your PingFederate Domain}}.com/idp/SSO.saml2
Rippling
Rippling IdP Sign-in URL.
JumpCloud
JumpCloud IDP URL
Okta
Okta Sign on URL
Google Applications
SSO URL
-
In the Domain Aliases field, enter the business domain names separated by commas or space.
-
In the X509 Signing Certificate field, enter the X.509 signing certificate for the application from the SAML Identity Provider.
If you have the signing certificate as PEM/CERT file, click Upload PEM/CERT File and select the file.
-
Click Done.
|
Note - After the first successful authentication of a member with SAML, Harmony SASE does this:
|