You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/identity/saas-apps/samsara-tutorial.md
+11-20Lines changed: 11 additions & 20 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -56,10 +56,10 @@ Configure and test Microsoft Entra SSO with Samsara using a test user called **B
56
56
57
57
To configure and test Microsoft Entra SSO with Samsara, perform the following steps:
58
58
59
+
1.**[Configure domain verification in Samsara](https://kb.samsara.com/hc/en-us/articles/31499789674893-Verify-Domains-for-Secure-SSO-Authentication#UUID-9e9af4f3-fa9a-e18c-723d-66e148c98140)** - to enable SSO within Samsara, domain verification is a prerequisite.
59
60
1.**[Configure Microsoft Entra SSO](#configure-azure-ad-sso)** - to enable your users to use this feature.
60
61
1.**Create a Microsoft Entra test user** - to test Microsoft Entra single sign-on with B.Simon.
61
62
1.**Assign the Microsoft Entra test user** - to enable B.Simon to use Microsoft Entra single sign-on.
62
-
1.**[Configure Samsara SSO](#configure-samsara-sso)** - to configure the single sign-on settings on application side.
63
63
1.**[Create Samsara test user](#create-samsara-test-user)** - to have a counterpart of B.Simon in Samsara that's linked to the Microsoft Entra representation of user.
64
64
1.**[Test SSO](#test-sso)** - to verify whether the configuration works.
65
65
@@ -73,39 +73,27 @@ Follow these steps to enable Microsoft Entra SSO.
1. On the **Select a single sign-on method** page, select **SAML**.
75
75
1. On the **Set-up single sign-on with SAML** page, select the pencil icon for **Basic SAML Configuration** to edit the settings.
76
+
1. Open your Samsara dashboard and navigate to Settings > Single Sign-On tab. If you want to create a user SSO connection, click "Add" in the user SSO box. If you want to create a driver SSO connection, click "Add" in the driver SSO box. You will need to copy over values from Samsara into Entra ID SAML Configuration.
b. Copy the link from Post-back/ACS URL field in Samsara into the **Reply URL** text box in Entra ID.
90
85
91
86
> [!NOTE]
92
-
> These values aren't real. Update these values with the actual Sign-on URL, Reply URL, and Identifier. Contact the [Samsara Client support team](mailto:support@samsara.com) to get these values, or in Samsara, go to **Settings** > **Single-Sign-On** > **New SAML Connection** to obtain the \<ORGID\>. You also can refer to the patterns shown in the **Basic SAML Configuration** section.
93
-
94
-
1. On the **Set-up single sign-on with SAML** page, in the **SAML Signing Certificate** section, find **Certificate (Base64)** and select **Download** to download the certificate and save it on your computer.
> Update these values with the actual Reply URL, and Identifier. Contact the [Samsara Client support team](mailto:support@samsara.com) to get these values, or in Samsara, go to **Settings** > **Single-Sign-On** and select the connection you want to create in order to obtain the right ACS and Identifier URLs.
97
88
98
-
1. On the **Set-up Samsara** section, copy the **login URL**
89
+
1. On the **Set-up single sign-on with SAML**page, in the **SAML Signing Certificate**section, find and copy the **App Federation Metadata URL** or download the **Federation Metadata XML**. In the Samsara dashboard in Settings > Single Sign-on in the relevant SSO configuration (user or driver), paste the metadata URL or upload the file. Click Save to apply the changes.
To configure single sign-on on **Samsara** side, you need to send the downloaded **Certificate (Base64)** and **Login URL** from Azure portal to [Samsara support team](mailto:support@samsara.com). They set this setting to have the SAML SSO connection set properly on both sides.
109
97
110
98
### Create Samsara test user
111
99
@@ -129,4 +117,7 @@ You can also use Microsoft My Apps to test the application in any mode. When you
129
117
130
118
## Related content
131
119
120
+
For more information, please refer to the Samsara KB article on SSO configuration. [Samsara SSO KB Article](https://kb.samsara.com/hc/en-us/articles/18709097464077-Single-Sign-On-SSO-Authentication#UUID-ff7f0e21-59f5-e6d4-6b81-2f090c691895_section-idm232308954423931).
121
+
122
+
132
123
Once you configure Samsara you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Defender for Cloud Apps](/cloud-app-security/proxy-deployment-any-app).
0 commit comments