This topic tells you how to set up Microsoft Entra ID as your identity provider by configuring SAML integration in both Single Sign‑On for VMware Tanzu Application Service and Microsoft Entra ID.
Overview
To set up Microsoft Entra ID as your identity provider through SAML integration:
- Overview
- Set up SAML in <%= vars.product_short %>
- Set up SAML in Microsoft Entra ID
- Set up Claims Mapping
Set up SAML in Single Sign‑On
To set up SAML in Single Sign‑On, follow the steps in Configure SAML Settings.
Set up SAML in Microsoft Entra ID
To set up SAML in Microsoft Entra ID:
-
Log in to Microsoft Entra ID as a Global Admin at https://portal.azure.com/.
-
Navigate to Microsoft Entra ID tab > Enterprise application.
-
Select Non-gallery application. Provide a name and click Add.
-
Navigate to Microsoft Entra ID > Enterprise applications.
-
Click your app and then click the Single sign-on tab.
-
Select SAML-based Sign-on from the drop-down menu and click Upload metadata file to upload the metadata file you downloaded earlier in Set up SAML in Single Sign‑On.
-
Record the App Federation Metadata Url. You need this for setting up the SSO identity provider configurations. For more information, see Setting up SAML.
-
Provide a Notification Email and click Save.
-
Navigate to the Users and groups tab and then click Add User .
-
Select users or group names from the drop-down menu. For example, you can add a group that includes all users that should be able to log in to the Single Sign‑On plan.
Set up Claims Mapping
To set up claims mapping:
-
Navigate to Microsoft Entra ID (previously Azure Active Directory) > App registration. Click your app.
-
To enable user attribute mappings:
- Select the View and edit all other user attributes checkbox under the User Attributes header.
- Modify the attributes.
For more information, see the Microsoft documentation.
-
To pass group membership claims to the app:
- Click Manifest.
- Locate
groupMembershipClaims
and set the value to one of the following:SecurityGroup
. Groups claim contains identifiers of all security groups of which the user is a member.All
. Groups claim contains the identifiers of all security groups and distribution lists of which the user is a member.
- Save the change.
For more information, see the Microsoft documentation.
-
Navigate to Azure Active Directory > Groups.
-
For each group that the Single Sign‑On plan uses, record the Object ID. Azure AD passes the Object ID of these groups to the Single Sign‑On plan. For more information, see Configure Group Permissions.
Content feedback and comments