Configuring Single Sign-On for Microsoft Entra ID Users22 minutes to read
Note: The procedure outlined in this document applies only till PAM360 builds 7301. For builds 7400 and above, please refer to this help document. ManageEngine PAM360 integrates seamlessly with Microsoft Entra ID (formerly Azure Active Directory), enabling organizations to leverage Entra ID's robust identity and access management capabilities for secure Single Sign-On (SSO). By configuring PAM360 as a Service Provider (SP) and Microsoft Entra ID as an Identity Provider (IdP), users can centralize authentication processes, streamline access management, and enhance security through Entra IDs advanced authentication mechanisms. This integration ensures that users can log in once via Entra ID and gain access to PAM360 without re-authentication, providing a simplified and secure user experience. Additionally, the integration supports Single Logout (SLO), ensuring that when users log out from one application, they are automatically logged out from all connected applications, thereby maintaining secure and efficient user session management. Note: PAM360 also supports configuring SAML SSO for the Secondary server, allowing users to log in to PAM360 via the Secondary server when the Primary server is down, ensuring continuous access and minimal disruption.
1. Prerequisites
2. Steps to Configure SAML SSO for Microsoft Entra ID UsersBefore configuring SAML SSO for the users imported from Microsoft Entra ID, you must add PAM360 as an enterprise application in the Entra ID portal and assign Entra ID users to PAM360. In this section, you will learn how to add PAM360 as an enterprise application in the Entra ID portal, assign users to the enterprise applications, and configure SAML SSO. Follow the detailed instructions given below to complete the configuration process. 2.1 Adding PAM360 as an Enterprise Application in Entra ID PortalFollow these steps to add PAM360 as an enterprise application in the Microsoft Entra ID Portal.
Note: It is recommended to avoid the usage of special characters, spaces, or punctuation in the application name. 2.2 Assigning Entra ID Users to PAM360Follow these steps to assign Entra ID users to PAM360:
You have successfully assigned the Microsoft Entra ID users to PAM360. 2.3 Configuring SAML SSO for Entra ID Users in PAM360Configuring SAML Single Sign-On (SSO) in the Entra ID portal involves setting up key components to enable seamless authentication with PAM360. The process includes Basic SAML Configuration, where you define the SP details, and Attributes & Claims, where you specify the attributes or claims that Entra ID must include in the SAML assertions sent to PAM360. Additionally, under SAML Certificates, you should upload the PAM360 server certificate to allow Entra ID to verify the SAML requests it receives from PAM360. 2.3.1 Basic SAML Configuration
Note: For SAML SSO authentication, the Assertion Consumer Service (ACS) URL is the hostname of the PAM360 server by default. Follow these steps to update the ACS URL 2.3.2 Attributes & ClaimsAfter providing the required SP (PAM360) details under the Basic SAML Configuration section, you must configure the NameID Attributes Entra ID must include in the SAML Assertions it sends to the PAM360 after user authentication. PAM360 will compare the NameID attributes received in the SAML assertion with the PAM360 username before providing user access. Therefore, the NameID format must match the PAM360 username in your environment. When you create a custom SAML application in the Entra ID, the following claims are available by default under the Attributes and Claims:
If the PAM360 username for the users in your environment matches any of these claims, SAML Single Sign-On will work as intended. Follow these steps if you wish to include a new claim in the SAML assertion sent by Entra ID to PAM360:
You can find the new claim under the Additional Claims section on the Attributes & Claims page. Notes:
2.3.3. SAML CertificatesTo allow Microsoft Entra ID to verify the Single Sign-On requests sent by PAM360, you must upload the PAM360's SP certificate on the Entra ID portal. Using the SP certificate, Entra ID can verify that the SAML requests are sent from a trusted SP. Follow these steps to enable verification:
2.4 Configuring IdP Settings in PAM360After configuring PAM360 as an SP in the Microsoft Entra ID portal, you must configure Microsoft Entra ID as an IdP in PAM360 to establish it as a trusted entity. Access the PAM360 browser window and proceed with the IdP configuration starting from Step 2 - Configure Identity Provider Details. Explore this link for the detailed IdP configuration steps. Based on the provided steps, configure Entra ID as an IdP and configure SAML SSO on the PAM360 interface. To validate if the single sign-on works, click the Test button on the Test single sign-on with PAM360 window. Notes:
3. Steps to Enable MFA and Set up First Login for Microsoft Entra ID UsersFollow these steps to activate MFA for Microsoft Entra ID users in the Microsoft Entra ID portal and to set up their first login. 3.1 Enabling MFA for Microsoft Entra ID Users
3.2 Setting Up First Login for the MFA-Enabled Entra ID UsersTo set up First Login for MFA-enabled Entra ID users, install the Microsoft Authenticator application on your mobile device for additional security requirements. Scan the QR code on the website to download the application from the Play Store or App Store and set up your Microsoft account. To set up the First Login for MFA-enabled Entra ID users, follow these steps
4. Troubleshooting TipsYou may encounter one of the following error screens while using Microsoft Entra ID SAML SSO for authentication. 1. Error: AADSTS75011 Issue: PAM360 uses a password for SAML authentication, but some browsers, like Edge, may retain the previous session and attempt to use X509 certificates with Entra ID IdP. This can cause validation failures due to an AuthnRequest mismatch. Solution: To prevent this, disable the use of AuthnRequest elements by following these steps:
2. Error: AADSTS750054 Issue: This error is displayed due to the incorrect SAML Single Sign-On configuration on the Microsoft Entra ID portal. Solution: To prevent this issue, update the valid SP details on the Sign On URL and Reply URL fields:
3. Error: AADSTS7000218 Issue: SAML authentication failure due to the PAM360 enterprise application being created as a confidential client, preventing username/password authentication. Solution: To prevent this issue, you should update the PAM360 Enterprise Application created on the Microsoft Entra ID portal as a public client:
Note: If you have multiple redirect URLs, you need to make the necessary changes in all of them. 4. Error: AADSTS75005 Issue: This issue is displayed because Microsoft Entra ID does not support the HTTPS REDIRECT binding protocol for SAML responses. Solution: To prevent this issue, you should update the protocol binding as HTTPS POST on the Configuration For Single Sign-On Using SAML.
5. Error: ADSTS50105 Issue: The user lacks access to the PAM360 Enterprise Application in the Microsoft Entra ID portal. Solution: Ensure the user is assigned to the PAM360 enterprise application. The user must belong to an assigned group or should be assigned to the PAM360 enterprise application directly. Refer to the relevant help section for steps to assign users to the PAM360 enterprise application. 6. Error: [com.adventnet.passtrix.saml.SAMLResponseValidator]|[SEVERE]|[78]: SAML Signature could not be validated| Issue: This issue is displayed because PAM360 is unable to verify the SAML signature. Solution: To prevent this issue, verify the SP and IdP certificates configured on the Entra ID portal and PAM360, respectively. Ensure the serial numbers match and that the certificates are not expired. 7. Error: [com.adventnet.passtrix.saml.SAMLServlet]|[SEVERE]|[56]: No user with name XXXXX@yyyy.com configured | org.opensaml.xml.security.SecurityException: No user with the name XXXXX@yyyyy.com configured. Issue: This issue occurs when the NameID attribute sent by the IdP in the SAML assertion does not match the PAM360 username. Solution: To prevent this issue, create a new user claim on the Microsoft Entra ID portal that aligns with the PAM360 username. Explore this link for more information about creating a new claim on the Entra ID portal. | |