Configuring Single Sign-On for Microsoft Entra ID Users21 minutes to read
ManageEngine PAM360 integrates seamlessly with Microsoft Entra ID (formerly Azure Active Directory), enabling organizations to leverage Entra ID's robust identity and access management capabilities for secure Single Sign-On (SSO). By configuring PAM360 as a Service Provider (SP) and Microsoft Entra ID as an Identity Provider (IdP), users can centralize authentication processes, streamline access management, and enhance security through Entra IDs advanced authentication mechanisms. This integration ensures that users can log in once via Entra ID and gain access to PAM360 without re-authentication, providing a simplified and secure user experience. Additionally, the integration supports Single Logout (SLO), ensuring that when users log out from one application, they are automatically logged out from all connected applications, thereby maintaining secure and efficient user session management. This document covers the following topics:
1. Prerequisites
2. Steps to Configure SAML SSO for Microsoft Entra ID UsersBefore configuring SAML SSO for the users imported from Microsoft Entra ID, you must add PAM360 as an enterprise application in the Entra ID portal and assign Entra ID users to PAM360. In this section, you will learn how to add PAM360 as an enterprise application in the Entra ID portal, assign users to the enterprise applications, and configure SAML SSO. Follow the detailed instructions given below to complete the configuration process. 2.1 Adding PAM360 as an Enterprise Application in Entra ID PortalFollow these steps to add PAM360 as an enterprise application in the Azure Portal.
2.2 Assigning Entra ID Users to PAM360 Enterprise ApplicationFollow these steps to assign Entra ID users to the PAM360 enterprise application:
You have successfully assigned the Microsoft Entra ID users to the PAM360 enterprise application. 2.3 Configuring SAML SSO for Entra ID Users in PAM360Configuring SAML Single Sign-On (SSO) in the Entra ID portal involves setting up key components to enable seamless authentication with PAM360. The process includes Basic SAML Configuration, where you define the SP details, and Attributes & Claims, where you specify the attributes or claims that Entra ID must include in the SAML assertions sent to PAM360. Additionally, under SAML Certificates, you should upload the PAM360 server certificate to allow Entra ID to verify the SAML requests it receives from PAM360. 2.3.1 Basic SAML Configuration
2.3.2 Attributes & ClaimsAfter providing the required SP (PAM360) details under the Basic SAML Configuration section, you must configure the NameID Attributes Entra ID must include in the SAML Assertions it sends to PAM360 after user authentication. PAM360 will compare the NameID attributes received in the SAML assertion with the PAM360 username before providing user access. Therefore, the NameID format must match the PAM360 username in your environment. When you create a custom SAML application in the Azure portal, the following claims are available by default under the Attributes and Claims:
If the PAM360 username for the users in your environment matches any of these claims, SAML Single Sign-On will work as intended. Follow these steps if you wish to include a new claim in the SAML assertion sent by Entra ID to PAM360:
You can find the new claim under the Additional Claims section on the Attributes & Claims page. Notes:
2.3.3 SAML CertificatesTo allow Microsoft Entra ID to verify the Single Sign-On requests sent by PAM360, you must upload the PAM360's SP certificate on the Azure portal. Using the SP certificate, Entra ID can verify that the SAML requests are sent from a trusted SP. Follow these steps to enable verification:
Note: If you wish to use the SHA256 algorithm, do not enable this checkbox. Select SHA256 from the Algorithm field under SAML Properties during the IdP configuration. 2.4 Configuring IdP Settings in PAM360After configuring PAM360 as an SP in the Azure portal, you must configure Microsoft Entra ID as an IdP in PAM360 to establish it as a trusted entity. Access the PAM360 browser window and proceed with the IdP configuration starting from Step 2 - Configure Identity Provider Details. Explore this link for the detailed IdP configuration steps. Based on the provided steps, configure Entra ID as an IdP and configure the SAML properties on the PAM360 interface. To validate if the single sign-on works, click the Test button on the Test single sign-on with PAM360 window. Note: If you have users imported from Active Directory in your environment and wish to configure Microsoft Entra ID as the SAML SSO IdP for these users, explore this help document. 3. Steps to Enable MFA and Set up First Login for Microsoft Entra ID UsersFollow these steps to activate MFA for Microsoft Entra ID users in the Azure portal and to set up their first login. 3.1 Enabling MFA for Microsoft Entra ID Users
3.2 Setting Up First Login for the MFA-Enabled Entra ID UsersTo set up first login for MFA-enabled Entra ID users, install the Microsoft Authenticator application on your mobile device for additional security requirements. Scan the QR code on the website to download the application from the Play Store or App Store and set up your Microsoft account. To set up the First Login for MFA-enabled Entra ID users, follow these steps
4. Troubleshooting TipsYou may encounter one of the following error screens while using Microsoft Entra ID SAML SSO for authentication. 1. Error: AADSTS75011 Issue: PAM360 uses a password for SAML authentication, but some browsers, like Edge, may retain the previous session and attempt to use X509 certificates with Entra ID IdP. This can cause validation failures due to an AuthnRequest mismatch. Solution: To prevent this, disable the use of AuthnRequest elements in Microsoft Entra ID:
2. Error: AADSTS750054 Issue: This error is displayed due to the incorrect SAML Single Sign-On configuration on the Azure portal. Solution: To prevent this issue, update the valid SP details on the Sign On URL and Reply URL fields:
Note: If you have configured Microsoft Entra ID as an IdP for multiple server access URLs in your environment, then you must repeat this configuration change for all the server access URLs, i.e., PAM360 Enterprise Application. 3. Error: AADSTS7000218 Issue: SAML authentication failure due to the PAM360 enterprise application being created as a confidential client, preventing username/password authentication. Solution: To prevent this issue, you should update the PAM360 Enterprise Application created on the Azure portal as a public client:
Note: If you have configured Microsoft Entra ID as an IdP for multiple server access URLs in your environment, then you must repeat this configuration change for all the server access URLs, i.e., PAM360 Enterprise Application. 4. Error: AADSTS75005 Issue: This issue is displayed because Microsoft Entra ID does not support the HTTPS REDIRECT binding protocol for SAML responses. Solution: To prevent this issue, you should update the protocol binding as HTTPS POST on the SAML SSO Dashboard.
Note: If you have configured Microsoft Entra ID as an IdP for multiple server access URLs in your environment, then you must repeat this configuration change for all the server access URLs, i.e., PAM360 Enterprise Application. 5. Error: ADSTS50105 Issue: The user lacks access to the PAM360 Enterprise Application in the Azure portal. Solution: Ensure the user is assigned to the PAM360 enterprise application. The user must belong to an assigned group or should be assigned to the PAM360 enterprise application directly. Refer to the relevant help section for the detailed steps to assign users to the PAM360 enterprise application. 6. Error: [com.adventnet.passtrix.saml.SAMLResponseValidator]|[SEVERE]|[78]: SAML Signature could not be validated| Issue: This issue is displayed because PAM360 is unable to verify the SAML signature. Solution: To prevent this issue, verify the SP and IdP certificates configured on the Azure portal and PAM360, respectively. Ensure the serial numbers match and that the certificates are not expired. 7. Error: [com.adventnet.passtrix.saml.SAMLServlet]|[SEVERE]|[56]: No user with name XXXXX@yyyy.com configured | org.opensaml.xml.security.SecurityException: No user with the name XXXXX@yyyyy.com configured. Issue: This issue occurs when the NameID Attribute sent by the IdP in the SAML assertion does not match the PAM360 username. Solution: To prevent this issue, create a new user claim on the Microsoft Azure portal that aligns with the PAM360 username. Explore this link for more information about creating a new claim on the Azure portal. | |