Skip to content

Commit 401a152

Browse files
authored
Update samsara-tutorial.md
1 parent 7d5a12b commit 401a152

1 file changed

Lines changed: 11 additions & 20 deletions

File tree

docs/identity/saas-apps/samsara-tutorial.md

Lines changed: 11 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -56,10 +56,10 @@ Configure and test Microsoft Entra SSO with Samsara using a test user called **B
5656

5757
To configure and test Microsoft Entra SSO with Samsara, perform the following steps:
5858

59+
1. **[Configure domain verification in Samsara](https://kb.samsara.com/hc/en-us/articles/31499789674893-Verify-Domains-for-Secure-SSO-Authentication#UUID-9e9af4f3-fa9a-e18c-723d-66e148c98140)** - to enable SSO within Samsara, domain verification is a prerequisite.
5960
1. **[Configure Microsoft Entra SSO](#configure-azure-ad-sso)** - to enable your users to use this feature.
6061
1. **Create a Microsoft Entra test user** - to test Microsoft Entra single sign-on with B.Simon.
6162
1. **Assign the Microsoft Entra test user** - to enable B.Simon to use Microsoft Entra single sign-on.
62-
1. **[Configure Samsara SSO](#configure-samsara-sso)** - to configure the single sign-on settings on application side.
6363
1. **[Create Samsara test user](#create-samsara-test-user)** - to have a counterpart of B.Simon in Samsara that's linked to the Microsoft Entra representation of user.
6464
1. **[Test SSO](#test-sso)** - to verify whether the configuration works.
6565

@@ -73,39 +73,27 @@ Follow these steps to enable Microsoft Entra SSO.
7373
1. Browse to **Entra ID** > **Enterprise apps** > **Samsara** > **Single sign-on**.
7474
1. On the **Select a single sign-on method** page, select **SAML**.
7575
1. On the **Set-up single sign-on with SAML** page, select the pencil icon for **Basic SAML Configuration** to edit the settings.
76+
1. Open your Samsara dashboard and navigate to Settings > Single Sign-On tab. If you want to create a user SSO connection, click "Add" in the user SSO box. If you want to create a driver SSO connection, click "Add" in the driver SSO box. You will need to copy over values from Samsara into Entra ID SAML Configuration.
7677

7778
![Edit Basic SAML Configuration](common/edit-urls.png)
7879

79-
1. On the **Basic SAML Configuration** section, perform the following steps:
80+
1. In Entra ID, on the **Basic SAML Configuration** section, perform the following steps:
8081

81-
a. In the **Sign-on URL** text box, type a URL using one of the following patterns:
82-
`https://cloud.samsara.com/signin/<ORGID>` for US cloud customers
83-
`https://cloud.eu.samsara.com/signin/<ORGID>` for EU cloud customers
82+
a. Copy the link from Service Provider Entity ID field in Samsara into the **Identifier (Entity ID)** text box in Entra ID.
8483

85-
b. In the **Identifier (Entity ID)** text box, type a URL using the following pattern:
86-
`urn:auth0:samsara-dev:samlp-orgid-<ORGID>`
87-
88-
c. In the **Reply URL** text box, type a URL using the following pattern:
89-
`https://samsara-dev.auth0.com/login/callback?connection=samlp-orgid-<ORGID>`
84+
b. Copy the link from Post-back/ACS URL field in Samsara into the **Reply URL** text box in Entra ID.
9085

9186
> [!NOTE]
92-
> These values aren't real. Update these values with the actual Sign-on URL, Reply URL, and Identifier. Contact the [Samsara Client support team](mailto:support@samsara.com) to get these values, or in Samsara, go to **Settings** > **Single-Sign-On** > **New SAML Connection** to obtain the \<ORGID\>. You also can refer to the patterns shown in the **Basic SAML Configuration** section.
93-
94-
1. On the **Set-up single sign-on with SAML** page, in the **SAML Signing Certificate** section, find **Certificate (Base64)** and select **Download** to download the certificate and save it on your computer.
95-
96-
![The Certificate download link](common/certificatebase64.png)
87+
> Update these values with the actual Reply URL, and Identifier. Contact the [Samsara Client support team](mailto:support@samsara.com) to get these values, or in Samsara, go to **Settings** > **Single-Sign-On** and select the connection you want to create in order to obtain the right ACS and Identifier URLs.
9788

98-
1. On the **Set-up Samsara** section, copy the **login URL**
89+
1. On the **Set-up single sign-on with SAML** page, in the **SAML Signing Certificate** section, find and copy the **App Federation Metadata URL** or download the **Federation Metadata XML**. In the Samsara dashboard in Settings > Single Sign-on in the relevant SSO configuration (user or driver), paste the metadata URL or upload the file. Click Save to apply the changes.
9990

100-
![Copy configuration URLs](common/copy-configuration-urls.png)
91+
<img width="711" height="248" alt="entra_id_sso_doc" src="https://github.com/user-attachments/assets/225ddbc9-6e2e-42b0-8ccc-10b422462e7a" />
10192

10293
<a name='create-an-azure-ad-test-user'></a>
10394

10495
[!INCLUDE [create-assign-users-sso.md](~/identity/saas-apps/includes/create-assign-users-sso.md)]
10596

106-
## Configure Samsara SSO
107-
108-
To configure single sign-on on **Samsara** side, you need to send the downloaded **Certificate (Base64)** and **Login URL** from Azure portal to [Samsara support team](mailto:support@samsara.com). They set this setting to have the SAML SSO connection set properly on both sides.
10997

11098
### Create Samsara test user
11199

@@ -129,4 +117,7 @@ You can also use Microsoft My Apps to test the application in any mode. When you
129117

130118
## Related content
131119

120+
For more information, please refer to the Samsara KB article on SSO configuration. [Samsara SSO KB Article](https://kb.samsara.com/hc/en-us/articles/18709097464077-Single-Sign-On-SSO-Authentication#UUID-ff7f0e21-59f5-e6d4-6b81-2f090c691895_section-idm232308954423931).
121+
122+
132123
Once you configure Samsara you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Defender for Cloud Apps](/cloud-app-security/proxy-deployment-any-app).

0 commit comments

Comments
 (0)