SAML using Entra ID App
Entra ID, part of Microsoft Entra, is an enterprise identity service that provides single sign-on, multifactor authentication, and conditional access to guard against a wide range of cyber security attacks.
A BeyondTrust app, available in Entra ID App Gallery, provides Single Sign-On and provisioning via SAML 2.0. This app supports Remote Support and public portals, Privileged Remote Access, Password Safe, and Password Safe Cloud.
Install and Configure Entra ID App
Follow the steps below to install and configure this app.
- Locate the BeyondTrust SAML app in the Microsoft Entra ID Gallery.
- Change the name to your preferred descriptive name, for example, BeyondTrust SAML – Password Safe. Some screenshots below use BeyondTrustPrivileged Remote Access for examples, however, the process is the same for Password Safe.
Note
While a single instance of the app can service multiple BeyondTrust products simultaneously, we recommend creating a separate app instance for Password Safe, if you are using that product.
- Click Create.
- Information about the BeyondTrust SAML app displays when creation is completed.
- Click Set up single sign-on under Getting Started.
- Configure Basic SAML Configuration to match your Password Safe instance. The Entity IDs are specific to the instances for each product.
- Change the Unique Identifier (Name ID) to the Persistent format.
- Click Edit on the Attributes & Claims section:
Click Add a group claim.
Select Groups assigned to the application.
Leave Source attribute as the default of Group ID.
Check Customize the name of the group claim and enter Groups for the Name.
Click Save.
Ensure the Source and Value for each claim is configured as indicated in the below table.
Source | Value |
---|---|
FirstName (Optional) | user.givenname |
LastName (Optional) | user.surname |
Name (Required) | user.principalname |
Email (Optional) | user.mail |
Groups (Required) | user.groups |
Note
The group claim must be configured to use only groups assigned to the application. This prevents errors that may occur if a user belongs to more than 150 AD groups. For more information, see Configure group claims for applications by using Entra ID.
- Click Edit on the SAML certificates section.
- For Signing Option, select Sign SAML response and assertion.
- Download the Federation Metadata XML.
Configure SAML Entra ID Provider
Note
To configure SAML in Azure GovCloud you must be assigned the Cloud Application Administrator role.
Once the app has been configured, follow these steps to add the provider in BeyondInsight:
- From the left sidebar, click Configuration
- Under Authentication Management, click SAML Configuration.
- Click Create New SAML Identity Provider +.
- Paste the Identifier and Sign-On URL from the Entra ID app.
- Ensure Want SAML Response Signed and Want Assertion Signed match the Entra ID App selections.
- Select the Signature Method.
- Upload the certificate, using the certificate downloaded from the Entra ID App.
- Select Microsoft Entra ID for User Mapping.
- Click Create SAML Identity Provider.
Should you need any assistance, log into the Customer Portal to chat with Support.
Updated 6 days ago