Configure Azure AD SSO Integration to the MyVIP Portal
- Log in to the Azure Portal as a Global Administrator
- Click on 'Azure Active Directory'
- Click on 'Enterprise applications'
- Click on 'New application'
- Click on 'Create your own application'
- Select 'Integrate any other application you don't find in the gallery (Non-gallery)'
- Add the name “MyVIP” (or similar) as the app name, then click 'Create'. The Application view will be displayed
Setup SAML configurations for the “MyVIP” Enterprise Application
- In the application view, on the left panel, Click on 'Single Sign-on'
- Select SAML as the Single Sign-on Method
- In a separate tab or browser window, download the metadata file from https://login.vip.symantec.com/viplogin/saml/metadata
- On the “Setup Single Sign-On with SAML” page, select 'Upload metadata file', then click 'Add'. The Basic SAML Configuration section should populate.
- Enter Relay State Value as https://login.vip.symantec.com/viplogin/home?successUrl=<organizations’s success url>?cancelUrl=< organizations’s cancel url >?errorUrl=< organizations’s error url>
Adding User Attributes to the SAML Configuration
- Click 'Edit' in the 'Attributes and Claims' Section.
- Delete all the 'Additional claims'. Leave the predefined 'Unique User Identifier (Name ID)'.
- Add an additional claim with 'Claim name' “EMAIL” mapped to user.userprincipalname.
- Add an additional claim with 'Claim name' “PHONE” mapped to user.telephonenumber.
Certificate Upload, Download, and Azure AD/Microsoft Entra ID Identifier
- Download a .P12 certificate from your VIP Manager portal. (Important: If an SSO app to VIP Manager or VIP SSP is already configured, download the identical .P12 certificate used in those settings.)
- Locate SAML Certificates under Set up Single Sign-On with SAML and click edit.
- Select Import Certificate, locate the new .P12 certificate, then click Add.
- Click the 3 dots ... next to the new certificate and select Make certificate active.
- Set the Signing Option to Sign SAML Assertion and the Signing Algorithm to SHA-256.
- Click Save to commit the changes and exit the SAML Signing Certificate screen.
- (skip steps 7 and 8 if an SSO app for VIP Manager or VIP SSP access has already been configured.) Download the Certificate (Base64) certificate from the Token Signing Certificate section.
- Copy the Microsoft Entra ID Identifier from Set Up {My VIP application} section and save it in a text editor
Users and Groups
- Click on Users and Groups in the left pane and assign Users/Groups to access this MyVIP application.
Upload the Azure AD/Microsoft Entra ID Identifier and certificate to VIP Manager
Complete the following steps in VIP Manager to add Azure AD Identifier ID and Azure AD certificate:
- In VIP Manager, click the Account tab.
- Under the Account tab, select Single Sign-on.
- Click Edit next to IdP Service Settings.
- Enter the Azure AD Identifier URL saved in the text editor as the Entity ID.
- Click Browse and select the Base64 signing certificate downloaded earlier from the SAML certificates box(not the .p12 from VIP Manager).
- Click Submit.
Test MyVIP SSO access
- In the Azure MyVIP application, click Properties.
- The User Access URL can be used to access this application. To avoid cookie conflicts, test using a fresh browser session.
Configure Azure AD/Microsoft Entra ID SSO Integration to the VIP Manager Portal
- Log in to the Azure Portal as a Global Administrator
- Click on 'Azure Active Directory'
- Click on 'Enterprise applications'
- Click on 'New application'
- Click on 'Create your own application'
- Select 'Integrate any other application you don't find in the gallery (Non-gallery)'
- Add the name “VIP Manager” (or similar) as the app name, then click 'Create'. The Application view will be displayed
Setup SAML configurations for the "VIP Manager” Enterprise Application
- In the application view, on the left panel, Click on Single Sign-on
- Select SAML as the Single Sign-on Method
- In a separate tab or browser window, download the metadata file from https://manager.vip.symantec.com/vipmgr/saml/metadata
- On the “Setup Single Sign-On with SAML” page, select 'Upload metadata file', then click 'Add'. The Basic SAML Configuration section should populate.
- On the Setup Single Sign-On with SAM page, Edit the Basic SAML Configuration.
- Save the settings and X from the settings.
Adding User Attributes to the SAML Configuration
- On the Setup Single Sign-On with SAM page, click Edit in the Attributes and Claims Section.
- Click the predefined 'Unique User Identifier (Name ID)', then change the Source Attribute to user.mail (this attribute is sent to VIP Manager as the login ID).
- (optional for Out Of Band) Add an additional claim with 'Claim name' “EMAIL” mapped to user.userprincipalname.
- (optional for Out Of Band) Add an additional claim with 'Claim name' “MOBILE PHONE” mapped to user.mobilephone.
- (optional for Out Of Band) Add an additional claim with 'Claim name' “PHONE” mapped to user.telephonenumber.
Certificate Upload, Download, and Azure AD Identifier
- Download a .P12 certificate from your VIP Manager portal. (Important: If an SSO app to My VIP or VIP SSP is already configured, download the identical .P12 certificate used in those settings.)
- Locate SAML Certificates under Set up Single Sign-On with SAML and click edit.
- Select Import Certificate, locate the new .P12 certificate, then click Add.
- Click the 3 dots ... next to the new certificate and select Make certificate active.
- Set the Signing Option to Sign SAML Assertion and the Signing Algorithm to SHA-256.
- Click Save to commit the changes and exit the SAML Signing Certificate screen.
- (skip steps 7 and 8 if an SSO app for MyVIP or VIP SSP access has already been configured.) Download the Certificate (Base64) certificate from the Token Signing Certificate section.
- Copy the Microsoft Entra ID Identifier from Set Up {VIP Manager application} section and save it in a text editor
Users and Groups
- Click on Users and Groups in the left pane and assign Users/Groups to access this MyVIP application.
Upload the Azure AD/Microsoft Entra ID Identifier and certificate to VIP Manager
Complete the following steps in VIP Manager to add Azure AD/Microsoft Entra ID Identifier ID and Azure AD certificate. Skip this section if an SSO app for MyVIP access has already been configured:
- In VIP Manager, click the Account tab.
- Under the Account tab, select Single Sign-on.
- Click Edit next to IdP Service Settings.
- Enter the Azure AD Identifier URL saved in the text editor as the Entity ID.
- Click Browse and select the Base64 signing certificate downloaded earlier (not the .p12 from VIP Manager).
- Click Submit.
Test VIP Manager SSO access
- In the Azure VIP Manager application, click Properties.
- The User Access URL can be used to access this application. To avoid cookie conflicts, test using a fresh browser session.
- The VIP Admin account should already exist in the VIP manager for the successful SSO login.
Configure Azure AD/Microsoft Entra ID SSO Integration to the VIP SSP (self-service portal)
Note: Organizations are encouraged to use My VIP for self-service. The VIP SSP is supported but no longer updated.
- Log in to the Azure Portal as a Global Administrator
- Click on 'Azure Active Directory'
- Click on 'Enterprise applications'
- Click on 'New application'
- Click on 'Create your own application'
- Select 'Integrate any other application you don't find in the gallery (Non-gallery)'
- Add the name “VIP Self-Service Portal” (or similar) as the app name, then click 'Create'. The Application view will be displayed
Setup SAML configurations for the “VIP SSP” Enterprise Application
- In the application view, on the left panel, Click on 'Single Sign-on'
- Select SAML as the Single Sign-on Method
- In a separate tab or browser window, download the metadata file from https://ssp.vip.symantec.com/vipssp/saml/metadata
- On the “Setup Single Sign-On with SAML” page, select 'Upload metadata file', then click 'Add'. The Basic SAML Configuration section should populate.
- Enter Relay State Value as https://ssp.vip.symantec.com/vipssp/home.v?successUrl=<organizations’s success url>?cancelUrl=< organizations’s cancel url >?errorUrl=< organizations’s error url>
Adding User Attributes to the SAML Configuration
- Click Edit in the Attributes and Claims Section.
- Under Required Claim, click on Unique User Identifier (Name ID) claim to edit.
- Change Name Identifier Format to Unspecified.
- Save the changes.
- Note: Out-of-Band (OOB) is not supported with VIP SSP SSO through Azure. If SSO is a requirement, implement My VIP SSO through Azure.
Certificate Upload, Download, and Azure AD Identifier
- Download a .P12 certificate from your VIP Manager portal. (Important: If an SSO app to My VIP or VIP Manager is already configured, download the identical .P12 certificate used in those settings.)
- Locate SAML Certificates under Set up Single Sign-On with SAML and click edit.
- Select Import Certificate, locate the new .P12 certificate, then click Add.
- Click the 3 dots ... next to the new certificate and select Make certificate active.
- Set the Signing Option to Sign SAML Assertion and the Signing Algorithm to SHA-256.
- Click Save to commit the changes and exit the SAML Signing Certificate screen.
- (skip steps 7 and 8 if an SSO app for MyVIP or VIP Manager access has already been configured.) Download the Certificate (Base64) certificate from Token Signing Certificate section.
- Copy the Microsoft Entra ID Identifier from Set Up {VIP SSP application} section and save it in a text editor
Users and Groups
- Click on Users and Groups in the left pane and assign Users/Groups to access this application.
Upload the Azure AD Identifier and certificate to VIP Manager
- Log into VIP Manager and click the Account tab.
- Select Single Sign-on.
- Click Edit next to IdP Service Settings.
- Enter the Azure AD Identifier URL saved in the text editor as the Entity ID.
- Click Browse and select the Base64 signing certificate downloaded earlier from the SAML certificates box (not the .p12 from VIP Manager).
- Click Submit.
Test VIP SSP SSO access
- In the Azure MyVIP application, click Properties.
- The User Access URL can be used to access this application. To avoid cookie conflicts, test using a fresh browser session.