Skip to content

Latest commit

 

History

History
127 lines (76 loc) · 6.72 KB

File metadata and controls

127 lines (76 loc) · 6.72 KB
title pcx_content_type weight meta
Azure guide
how-to
3
title
Azure integration guide

Azure integration guide

This tutorial will walk you through the steps for configuring a non-gallery enterprise application within Azure Active Directory to establish a {{}}SAML{{}} SSO connection with Cloud Email Security (formerly Area 1).

1. Azure Active Directory configuration

  1. Log in to Azure portal and open Enterprise Applications.

  2. Select New Application.

    Create a new application

  3. Select Create your own application.

    Select create your own application

  4. Input a descriptive name for your app and select Integrate any other application you don't find in the gallery (Non-gallery) > Create.

    Give your application a descriptive name

  5. On the application Overview page that opens, select 2. Set up single sign on.

    Select single sign-on as the type of app

  6. Select SAML as your single sign-on method.

    Select SAML as the sign-on method

  7. Select the pencil icon to edit the Basic SAML Configuration.

    Select the pencil icon to edit Basic SAML Configuration

  8. Enter the following configuration settings:

    Identifier (Entity ID) https://horizon.area1security.com
    Reply URL (Assertion Consumer Service URL) https://horizon.area1security.com/api/users/saml
    Sign-On URL Leave blank
    Relay State Leave blank
    Logout URL Leave blank
  9. Select Save and the cross button to exit Basic SAML Configuration.

  10. Select the pencil icon to edit SAML Certificates and make the following changes:

    • Signing Option: Select Sign SAML response from the drop-down menu.
    • Signing Algorithm: Select SHA-1 from the drop-down menu.

    Select Sign SAML response and SHA-1 from the menu

  11. Select Save and the cross button to exit SAML Certificates.

  12. Still in the SAML Certificates section, find Federation Metadata XML and select Download. You will need this information for the SSO Configuration in the Cloud Email Security dashboard.

    Download the Metadata XML information

Your Azure configuration is now complete. It should look similar to this:

Your Azure configuration should be similar to this one

{{

}} Now that the application configuration is complete, update User Assignments and Application Properties as needed to ensure that authorized personnel are able to access the new application from their Apps Catalog. Additionally, you may choose to update the application logo image file or the privacy policy URL. {{}}

2. Configure Cloud Email Security to connect to Azure

  1. Log in to the Cloud Email Security dashboard.

  2. Go to Settings (the gear icon).

  3. In Users and Actions > Users and Permissions add the email addresses of all your authorized administrators.

    Fill out your authorized administrators

  4. Go to SSO Settings, and enable Single Sign On.

    Enable SSO

  5. In SSO Enforcement, choose one of the settings according to your specific needs: {{}}

  6. For SAML SSO Domain, enter login.microsoftonline.com.

  7. In Metadata XML paste the XML metadata you downloaded in the previous step 11. You can open the downloaded file with a text editor to copy all the text. Make sure there are no leading carriage returns or spaces when you copy the text. Your copied text should begin with:

    <?xml version="1.0" encoding="utf-8"?><EntityDescriptor ID="_<YOUR_DESCRIPTOR_ID>" entityID="https://<YOUR_ENTITY_ID> " xmlns="urn:oasis:names:tc:SAML:2.0:metadata">...
  8. Select Update Settings to save your configuration.

3. Test SSO configuration

After completing both the Azure and Cloud Email Security set ups, you can test your SSO access. In this example, the logo for Cloud Email Security has been updated.

{{

}}Verify that the User Assignments and Application Properties of your new Azure AD application have been updated accordingly to ensure that authorized personnel are able to access the new application from their Office 365/Azure Apps Catalog page. Application logos and privacy policy URL can also be updated as needed.{{}}

  1. Log in to your Office 365 portal.

  2. Select All Apps.

  3. Go to Settings > SSO.

  4. Locate the Cloud Email Security Horizon application (or whichever name you gave your application), and select it to initiate your SSO login with Cloud Email Security.

  5. If you configured everything correctly, you should be signed in to the Cloud Email Security Portal and redirected to the dashboard.

Troubleshooting

If you have trouble connecting your Azure account to Cloud Email Security, make sure that:

If all else fails, enable Chrome browser debug logs. Then, log your activity when SSO is initiated, and contact Cloudflare support.