The article describes steps to implement SAML Management Users authentication based on user and groups on the Web Isolation and Entra (Azure) tenants.
- Cloud Web Isolation
- Microsoft Entra (Azure)
Web Isolation:
Management -> Identity Providers
Create a "New Identity Provider" -> Select "SAML Identity Provider"
Fill in the "Name" and "Description", select "Generic SAML" as IdP Type and tick the option "Fill in IdP details later"
Click the "Create" button.
Select "Yes" option under "Does Identity Provider Support Importing A Metadata File?" and click EXPORT button.
Microsoft Entra (Azure):
Applications -> Enterprise applications -> All applications
Identifier (Entity ID) https://support-<myInstanceName>.prod.fire.glass/samlcallback
Reply URL (Assertion Consumer Service URL) https://support-<myInstanceName>.prod.fire.glass/samlcallback
Sign on URL (Optional) https://support-<myInstanceName>.prod.fire.glass/samlcallback
Relay State (Optional) https://support-<myInstanceName>.prod.fire.glass/samlcallback
Logout Url (Optional) https://support-<myInstanceName>.prod.fire.glass/samllogoutcallback
Click Save button.
Web Isolation:
Management -> Identity Providers
Username Attribute: nameID
Username Identifier Format: urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress
Groups Attribute: http://schemas.microsoft.com/ws/2008/06/identity/claims/groups
Click the "Update" button and Push Settings.
Authentication based on User:
- Select Attribute Type Username and specify username in email format under Username field
- Click +ADD and Update buttons.
Authentication based on Group:
- Select Attribute Type Group and specify Group Object ID in under Group field
- Click +ADD and Update buttons.