Set up Microsoft Azure as a third-party SAML identity provider
Before you begin
Make sure you have an Azure premium account.
To set up Microsoft Azure as a third-party SAML IdP:
-
In the Microsoft Azure portal, complete these steps:
-
In SIA, complete these steps:
-
Add Microsoft Azure AD as a third-party SAML identity provider.
-
Download and deploy an identity connector. For more information, see Create and download an identity connector.
-
Add your AD to SIA. As part of this procedure, make sure you assign the identity connector that you created to the directory. For more information, see Add a directory.
-
Assign AD to the Azure IdP. See Assign AD to the Azure identity provider.
-
-
If this is the first Azure IdP that you are creating in SIA, add domains that are specific to Azure to an exception list. For more information, see Add identity provider domains to an exception list.
-
Test SSO. After you assign the IdP to a policy for authentication, you can try to access a website that requires authentication with the test user account that you created and assigned to Azure AD.
Add an Akamai Enterprise Application Access gallery application to Azure AD
To set up Azure AD as an IdP, you need to first add the application for Akamai Enterprise Application Access to Azure AD, then select this application from the Azure gallery:
-
Log in to the Azure portal.
-
In the navigation menu, select Azure Active Directory.
-
Click Enterprise Applications.
-
Click +New application to add a new enterprise application.
-
In the Add an application panel, under Add from gallery search box, enter
Akamai
. Select Akamai Enterprise Access Application as your application and in the panel that appears, click Add.
Next steps
Set up single sign-on for Enterprise Application Access application.
Set up single sign-on for Enterprise Application Access application
Before you begin
Add an Akamai Enterprise Application Access gallery application to Azure AD.
To set up SSO for the Enterprise Application Access gallery application you added:
-
In the Getting Started wizard, click Set up single sign on.
-
Click SAML as the SSO method. The Akamai Enterprise Application Access - SAML-based Sign-On window opens.
-
Click the edit icon for Basic SAML Configuration.
-
In the Identifier (Entity ID) and the Reply URL (Assertion Consumer URL) fields, enter the IdP URL in this format:
https://<YOUR-IDP-NAME>.login.go.akamai-access.com/saml/sp/response
where <YOUR-IDP-NAME> is the hostname of your IdP.
-
Click Save. The User Attributes & Claims are populated with all of the attributes and claims that are understood by SIA.
-
In the User Attributes & Claims section, click the edit icon and click the Unique User Identifier (NameID).
-
On the Manage Claim window, enter
user.userprincipalname
oruser.mail
into the Source attribute field and click Save. This attribute identifies the user in the application. -
On the SAML Signing Certificate section, download the Federation Metadata XML file. Save the metadata file to a secure location. You'll upload this file in the SIA IdP configuration.
-
In the Set up Akamai Enterprise Application Access section, copy the Login URL. You can click the clipboard icon to save this URL to your clipboard. You provide this URL when you configure the IdP in SIA.
Next steps
Create a test user in Azure AD.
Create a test user in Azure AD
This test user lets you test SSO after you set up Azure AD and the IdP in SIA.
Before you begin
Add an Akamai Enterprise Application Access gallery application to Azure AD.
To create a test user that you can assign to the Akamai Enterprise Application Access gallery application:
-
In the Azure Portal navigation menu, select Azure Active Directory.
-
Under Manage, select Users and in the panel that appears, select All Users.
-
Click +New User.
-
Add a user with a username and password. Make sure you enter the username in this format:
username@companydomain.extension
-
Click Create.
Next steps
Assign the test user to the application.
Assign the test user to the application
You'll use this user to test SSO.
Before you begin
Create a test user in Azure AD.
To assign a test user to the Akamai Enterprise Application Access gallery application:
-
In the Azure Portal navigation menu, select Azure Active Directory.
-
Under Manage, select Enterprise Applications.
-
Select All applications.
-
In the list of applications, select Akamai Enterprise Application Access.
-
Under Manage menu, select Users and groups.
-
Click +Add user.
-
In the Add Assignment window, click Users and Groups.
-
Select the user that you want to assign to the group. If necessary, you can search for the user by entering the name in the search text box.
-
Click Select.
-
In the dialog, click Assign.
Next steps
Sync users from Active Directory to Azure AD.
Sync users from Active Directory to Azure AD
Before you begin
Make sure you create a test user in Azure AD and assign it to the Akamai Enterprise Application Access gallery application.
This procedure may not be necessary if you've already synced AD to your Azure implementation.
To sync users from your AD to Azure AD:
-
Download Azure AD Connect from the Azure portal:
-
In the Azure navigation menu, select Azure Active Directory.
-
Under Manage, select Azure AD Connect.
-
Under Provision from Active Directory, click Download Azure AD Connect.
-
-
Install Azure AD Connect. Complete these steps:
-
On the Welcome window, click Continue.
-
Click Use Express Settings.
-
On the Connect to Azure AD window, enter your global administrator credentials for Azure AD, and click Next.
-
In the Connect to AD FS window, enter your AD FS credentials, and click Next.
-
On the Ready to Configure window, select Start the configuration process as soon as the configuration completes and click Install.
-
-
In the Azure Portal, confirm that users were synchronized and now appear in the portal.
-
Assign a global administrator role to a user you synchronized. Complete these steps:
-
Select a user.
-
Under Manage, select Assigned roles.
-
In the panel that appears, click +Add assignment.
-
In the list of directory roles, select Global administrator and then click Add.
-
-
Assign this user to the Akamai Enterprise Application Access application:
-
Return to the Akamai Enterprise Application Access application.
-
Click Add user.
-
In the Add Assignment pane, select Users and groups.
-
Search for the user that you assigned with the global administrator role.
-
Click Select.
-
In the dialog, click Assign.
-
Next steps
Add Microsoft Azure AD as a third-party SAML identity provider.
Add Microsoft Azure AD as a third-party SAML identity provider
Before you begin
Confirm that you completed the required setup in the Azure portal. See Set up Microsoft Azure as a third-party SAML identity provider.
To add Microsoft Azure AD as a third-party SAML IdP:
-
In the Threat Protection menu of Enterprise Center, select Identity & Users > Identity Providers.
-
Configure basic IdP settings:
-
In the Name and Description fields, enter a name and description for the IdP.
-
In the Provider Type menu, select Third-Party SAML.
-
Click Continue.
-
-
In the General settings section:
-
For Identity Intercept, select Use Akamai domain and enter a hostname. The identity intercept is the URL for the authentication page that's presented to users. The hostname you provide here is the one you entered in the Set up single sign-on for Enterprise Application Access application.
-
In the Akamai Cloud Zone, select a cloud zone that is closest to the user base.
-
-
Complete these steps in the Session section:
- For the Session Idle Expiry setting, enter a time that is 35 minutes or more.
- Use the default settings for the Limit Session Life and Max Session Duration settings.
-
In the Authentication section, complete these steps:
-
In the URL field, enter the URL that you provided for the Identity Intercept.
-
Select Sign SAML request.
-
Select Encrypted SAML response.
-
For the IdP metadata file, click Choose File.
-
Browse to the metadata file and click Open.
-
-
In the Advanced Settings, select Enable authorization.
-
Click Save.
Next steps
-
Add AD to SIA. As part of this procedure, make sure you assign an identity connector to the directory. For instructions, see Add a directory.
Assign AD to the Azure identity provider
Before you begin
Add AD to SIA. For instructions, see Add a directory.
To review the overall setup process for adding Azure as a third-party SAML IdP, see Set up Microsoft Azure as a third-party SAML identity provider.
To assign your AD to your Microsoft Azure AD third-party SAML IdP:
-
In the Threat Protection menu of Enterprise Center, select Identity & Users > Identity Providers.
-
Click the name of the Azure IdP.
-
Click the Directories tab.
-
Click the link icon and select the AD that you added.
-
Click Associate.
Next steps
-
Confirm that users are synchronized and appear in SIA, including the user you associated with the application in Azure AD.
-
Deploy the IdP:
-
In the SIA IdP configuration, you can click the icon next to the Ready for Deployment status. A deployment icon also appears next to a failed deployment status in case you need to deploy the IdP again. This action starts the deployment process.
-
Deploy IdP configuration changes in the list of Pending Changes. For more information, see Deploy configuration changes.
-
-
If this is the first Azure IdP that you are creating, add the Azure IdP domains to an exception list. See Add identity provider domains to an exception list.
-
Associate the IdP with a policy that's enabled for authentication. For more information, see Require authentication to access a website or web application.
-
Test SSO. After you assign the IdP to a policy for authentication, you can try to access a website that requires authentication with the test user account you created.
Updated over 1 year ago