Universal Policy Administrator Documentation
Configuring SAML Authentication with Microsoft ENTRA ID
- Install the UPA Gatekeeper and Gateway.
- Create and configure UPA as an enterprise application in your Microsoft Entra ID tenant:
- Sign in to the Microsoft Entra admin center:
- From the left navigation pane, select Enterprise apps > All applications.
- Select New application.
- On the Browse Microsoft Entra Gallery page, select Create Your Own Application.
- Enter a name for your application. For example, ‘UPA_SAML’.
- Select Integrate any other application you don’t find in the gallery (Non-gallery).
- Click Create.
- Assign Users and Groups:
- On your application’s Overview page, select Assign Users and Groups from the Identity menu or the Getting Started area.
- Select Add User/Group on the Users and Groups page.
- On the Users and Groups tab of the Add Assignment page, select one or more Users and Groups checkboxes.
- Click Select
- On the Select a role tab of the Add Assignment page, select a role
- Click Select
- Click Assign
- (Optional) On the Users and Groups page, select a User or Group.
- (Optional) Select Edit Assignment to assign a different role
- (Optional) Select Remove Assignment to delete assigned users and groups
- Set up single sign-on:
- Configure your application to use SAML authentication:
- Download the HAPI SAML metadata:
- In the Full Armor UPA Owner Portal (https://<gatekeeper>/portal/account), select SSO.
- Click Get SAML Metadata.
- Save to a file. For example, C:\UPA\Metadata\GetSAMLMetatadata.xml.
- Download the HAPI SAML metadata:
- Navigate to the Microsoft Entra admin center:
- From the left navigation pane, select Single sign-on.
- On the Single sign-on page, select SAML.
- On the SAML-based Sign-on page, select Upload metadata file and upload the HAPI SAML metadata saved in a previous step.
- On the Basic SAML Configuration tab, enter a domain name for UPA under Relay State (Optional), to use with Microsoft Entra ID users and groups. For example, ‘Entra’ or ‘MyDomain’.
- Enter the Sign on URL (Optional) (https://<gatekeeper>/Portal/SSO/SamlLogin?provider=<ProviderName>) where Provider Name is the name of the SAML provider for UPA, specified in the previous step.
- In the SAML Certificates area, select Download Federation Metadata XML.
- Save to a file. For example, C:\UPA\Metadata\SAMLFederationMetatadata.xml.
- Configure your application to use SAML authentication:
- Sign in to the Microsoft Entra admin center:
- Configure UPA to use SAML authentication:
- In the Full Armor UPA Owner Portal (https://<gatekeeper>/portal/account), select SSO.
- Click Add SAML Provider to launch the SAML Configuration Settings page and complete the following steps:
- Enter the Provider Name to match the value in Relay State in a previous step.
- Select the Set as Default Login Provider check box for the UPA web console to use this SAML provider as the default identity provider for logins
- (Optional) To login with a non-default SAML provider, go to https://<gatekeeper>/Portal/SSO/SamlLogin?provider=<ProviderName>.
- In the Provisioning Mode list, click AutomaticProvisioning
- Click Configure Provisioning to launch the Provisioning Settings page:
- View the Provider Name
- View the Provisioning Mode
- Click Get SCIM Token
- Click Configure Claims Mapping to launch the Claims Mappings page:
- In the Match login claims to users using this property list, click UserName.
- Enter http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name as the Unique ID.
- Enter http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name as the UserName.
- Enter http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name as the Display Name.
- (Optional) Configure a different claim in your Microsoft Entra application’s SAML-based Sign-on > Attributes & Claims section.
- Enter http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress as the Email Address.
- Enter http://schemas.xmlsoap.org/ws/2005/05/identity/claims/groups as the Groups claim.
- You may leave Domain\Username blank.
- You may leave SID blank.
- You may leave IP Address blank.
- Click Save
- In the Name ID Format list, click EmailAddress
- In the Signature Algorithm list, click SHA_256
- Select the Always Sign Requests check box
- Enter the Logout Url to send the SAML logout response to the application
- Enter IDP Metadata
- Click Save Changes
Note: To assign UPA roles based on Groups, you must configure a Group Claim in your Microsoft Entra application, else to delegate UPA roles to individual users you might leave this field blank.
- Configure provisioning in the Microsoft Entra admin center:
- In the Microsoft Entra admin center
- From the left navigation pane, go to Enterprise apps
- Select your application created in the previous steps
- On your application’s Overview page, select Provisioning
- On your application’s Provisioning page, select Provisioning again
- In the Provisioning Mode list, click Automatic.
- In the Admin Credentials section:
- Enter the Tenant URL of the SCIM endpoint https://<gatekeeper>/api/scim>.
- Paste the Secret Token retrieved in a previous step
- Click Test Connection to verify.
- In the Settings section:
- Select to Send an email notification when a failure occurs Notification Email
- Select to Prevent accidental deletion Accidental deletion threshold
- Click Save
- Click Start Provisioning and allow time for the initial provisioning cycle to complete
- Check the provisioning status in the Microsoft Entra admin center
- Assign a UPA Global Administrator role:
- In the Full Armor UPA Owner Portal, select SSO when provisioning completes
- Select the List Users button for the SAML provider
- Confirm that the users or groups were imported correctly
- Select the user to grant Global Administrator permissions
- Click Set User as Global Admin
For more information, see Enable SAML single sign-on for an enterprise application in Microsoft Entra ID
