Skip to content

Latest commit

 

History

History
60 lines (40 loc) · 5.87 KB

File metadata and controls

60 lines (40 loc) · 5.87 KB

Entra ID Enterprise Application setup

This example shows setting up an Entra ID (formerly Azure AD) Enterprise Application and connecting this to Snyk to facilitate SSO. To configure your Azure Enterprise Application to use SSO with Snyk, first obtain an entity ID and a reply URL (Assertion Consumer Service URL) from Snyk.

  1. From the dropdown at the top left select GROUP OVERVIEW and then the cog icon (top right corner) to get to your group settings.

    Select group overview

    Select group overview

  2. Click on SSO and copy the values under Entity ID and ACS URL or leave the browser tab open for easy access.

    Group Settings: SSO

    Group Settings: SSO

  3. Navigate to Azure and open Entra ID.

    Entra ID Default Directory

    Entra ID Default Directory

  4. Click Add then Enterprise application.

    Add Enterprise application

    Add Enterprise application

  5. Choose Create your own application.

    Create your own application

    Create your own application

  6. Name the application appropriately, for example, Snyk-SSO, making sure that Integrate any other application you don't find in the gallery (Non-gallery) is selected and then click Create.

    Application name and integration

    Application name and integration

  7. For the new app, select Set up single sign on and Get started.

    Set up single sign-on, Get started

    Set up single sign-on, Get started

  8. Select SAML as the SSO method.

    Select SAML

    Select SAML

  9. Click Edit under Basic SAML configuration.

    Edit basic SAML configuration

    Edit basic SAML configuration

  10. Add the Identity (Entity ID) and reply URL (Assertion Consumer Service URL) you obtained from Snyk and click Save; then close the edit window.

    Entity ID and Assertion Consumer Service URL

    Entity ID and Assertion Consumer Service URL

  11. Scroll to find the login URL needed to finish the configuration in Snyk. Copy it and paste it into the SSO settings in the Snyk portal.

    Login URL

    Login URL

    Sign in URL in Snyk portal

    Sign in URL in Snyk portal

  12. Return to Entra ID and click Download next to Certificate (Base64).

    Download SAML Certificate (Base 64)

    Download SAML Certificate (Base 64)

  13. Open the downloaded certificate in your preferred text editor, copy the text and paste it into the Snyk X509 signing certificate field, and add the relevant domains that are supported by this SSO connection.
    Finally, verify if an IdP-initiated workflow should be enabled and then click Create Auth0 connection if you are creating a completely new connection or Save changes if you are editing an existing connection.

    Enter certificate and domains supported, set connection

    Enter certificate and domains supported, set connection

  14. Decide how new users should be treated when signing in and choose the option you would like to use: Group member, Org collaborator, or Org admin. Finally, modify the profile attributes if your settings in Azure deviate from the default; then click Save changes and verify you can log in, either with the direct URL at the top of step 3 or by going to the generic SSO login.

    If you are not receiving profile values as expected, you may need to add email, name, and username as additional claims within Azure SSO settings and then map those accordingly in the Snyk SSO Profile attributes section.

    Azure claim settings

    Azure claim settings

    Profile attributes section

    Profile attributes section

If you wish to add signature verification of the incoming Snyk request:

  1. Download the the Signing certificate at step 1 of the Snyk SSO settings.
  2. Use the following openssl command to convert it to .cer-format openssl x509 -outform DER -in snyk.pem -out snyk.cer
  3. At the bottom of the SAML Certificates settings of your SSO app in Active Directory, click Edit next to Verification certificates.
  4. Check Require verification certificates and upload the certificate from the output of the above openssl command and click Save.