Configure an Azure Active Directory enterprise application
You can integrate Azure Active Directory with Vantage. To do this you must create an enterprise application in Azure Active Directory and assign users to it.
Before you begin
- Be of type office 365mail enabled security or security
- Have the AuthNContext property set to trueNote:Users, guests, and applications contained directly in this group are granted access to Vantage. Azure denies access to users contained in the group's subgroups.
About this task
Procedure
-
Select
.
-
Select + New application.
A dialog shows.
-
Select Create your own application.
A dialog shows.
-
In the What's the name of your app? filed, enter a name
such as: Nozomi Networks Vantage.
- Select Integrate any other application you don't find in the gallery (Non-gallery).
-
Enter any other Azure Active Directory details that are needed to complete the
configuration of the new application. Select
Create.
The application has been created.
- Open the application.
-
Select
.
- Specify the Reply URL which corresponds to the assertion consumer service (ACS) uniform resource locator (URL) for Vantage. For example: https://YOUR_VANTAGE_URL/api/v1/saml/auth
- Define the Entity ID. For example: https://YOUR_VANTAGE_URL/api/v1/saml/metadata
-
Define attributes and claims.
Note:Vantage authentication relies on user group claims. You must create such claims for any group used for authentication. Users that belong to the group pass the claim that you define. XREF
- Optional:
Upload an image to use as an icon in the security assertion markup language (SAML)
app.
-
After the application has been configured, it will show in Azure.
-
Download the Azure Active Directory metadata file.
- Configure Vantage for SSO.