Entra ID
Follow the steps documented below to integrate your Rafay Org with Microsoft Entra ID (formerly Azure AD) for Single Sign On (SSO) of users to the Rafay Platform.
Important
Only users with "Organization Admin" privileges can configure IdP Integrations
Step 1: Create IdP¶
- Login into the Web Console as an Organization Admin.
- Click on System and Identity Providers.
- Click on New Identity Provider.
- Provide a name, select "Custom" from the IdP Type drop down.
- Enter the "Domain" for which you would like to enable SSO.
Important
Within an org, the domain of an IdP cannot be used for another IdP. A domain existing in an org can be used in multiple orgs (for one IdP in each org)
- Enter an email for the Admin Email.
- Optionally, toggle Encrypted SAML Assertion if you wish to send/receive encrypted SAML assertions.
- Provide a name for the Group Attribute Name, for this exercise we are using "RafayRoles" and will use this value later.
- Optionally, toggle Include Authentication Context if you wish to send/receive auth context information in assertion.
- Click on Update & Continue.
Important
Encrypting SAML assertions is optional because privacy is already provided at the transport layer using HTTPS. Encrypted assertions provide an additional layer of security on top ensuring that only the SP (Org) can decrypt the SAML assertion.
Step 2: View SP Details¶
The IdP configuration wizard will display critical information that you need to copy/paste into your Entra ID Enterprise Application. Provide the following information to your Entra ID administrator.
- Assertion Consumer Service (ACS) URL
- SP Entity ID
- Name ID Format
Step 3: Create the Rafay Application in Entra¶
- Login into your Entra admin center as an Administrator.
- Browse to Identity > Applications > Enterprise applications and then select New application.
- Select Create your own application.
- Select Non-gallery application and select Create to create a new application.
Step 4: Configure SAML¶
In the application configuration page
- Go to Single sign-on and select SAML.
- Click Edit for Basic SAML Configuration.
- Copy/Paste the Entity ID from Step 2 into the Identifier.
- Copy/Paste the ACS URL from Step 2 into the Reply URL.
- Click Save to save the configuration.
6.. Click Edit User Attributes & Claims.
- Click on Add new claim.
- Enter the Group Attribute Name we entered in Step 1 as the Name.
- Select "user.assignedroles" for the Source attribute.
- Click on Save to save the settings.
Step 5: Assign Users an App Role¶
The controller will manange permissions for a given role or group name. The "Group" configuration step is critical because it will ensure that Entra ID will send the groups or roles the user belongs to as part of the SSO process. The controller uses the group information to transparently map users to the correct group/role.
If you are utilizing App Roles and a roles claim follow step 5.1.
Otherwise, follow Step 6.2 to use a group claim for the Group Attribute to send to the controller.
Step 5.1: Configure an App Role¶
Create App Role
- Login into your Entra admin center as an Administrator.
- Browse to Identity > Applications > App registrations and then select All applications.
- Select the Rafay application.
- Select App roles and then + Create app role.
- Enter a Display name such as "rafay-org-admins".
- Select "Users/Groups" as the Allowed member types.
- Set the Value to "rafay-org-admins".
- Enter a Description.
- Enable the app role.
- Select Apply.
Assign the Application an Owner
- In your app registration, under Manage, select Owners, and Add owners.
- In the new window, find and select the owner(s) that you want to assign to the application. Selected owners appear in the right panel. Once done, confirm with Select and the app owner(s) appear in the owner's list.
Assign App Role to the Application
- Browse to Identity > Applications > App registrations and then select All applications.
- Select All applications to view a list of all your applications. If your application doesn't appear in the list, use the filters at the top of the All applications list to restrict the list, or scroll down the list to locate your application.
- Select the application to which you want to assign an app role.
- Select API permissions > Add a permission.
- Select the My APIs tab, and then select the "Rafay" app.
- Under Permission, select the roles you want to assign.
- Select the Add permissions button complete addition of the roles.
Grant admin consent
- In the app registration's API permissions pane, select Grant admin consent for Rafay.
- Select Yes when prompted to grant consent for the requested permissions.
The Status column should reflect that consent has been Granted for Rafay.
Assign User to App Role
- Browse to Identity > Applications > Enterprise applications.
- Select All applications to view a list of all your applications. If your application doesn't appear in the list, use the filters at the top of the All applications list to restrict the list, or scroll down the list to locate your application.
- Select the application in which you want to assign users or security group to roles.
- Under Manage, select Users and groups.
- Select Add user to open the Add Assignment pane.
- Select the Users and groups selector from the Add Assignment pane. A list of users and security groups is displayed. You can search for a certain user or group and select multiple users and groups that appear in the list. Select the Select button to proceed.
- Select Select a role in the Add assignment pane. All the roles that you defined for the application are displayed.
- Choose a role and select the Select button.
- Select the Assign button to finish the assignment of users and groups to the app.
- Browse to the Applications page for the User we just added.
Confirm that the users and groups you added appear in the Users and groups list.
Step 5.2: Configure Group Claim for Users and Groups Synced from Active Directory¶
Assign Active Directory Users and Groups to the App:
- Go to Enterprise applications > Rafay > Users and groups and select Add user/group.
- Select the Users and/or Groups synced from Active Directory to allow access to the Web Console.
- Assign the User Role for the selected groups.
Add Group Claims Using Active Directory Group Names:
- Go to Enterprise applications > Rafay > Single sign-on.
- Click Edit for User Attributes & Claims.
- Select Add a group claim.
- Select the Source attribute as "sAMAccountName" from your Active Directory group name/memberships of the users to send in the group claim.
- Provide the name for the__Name__ to the same group attribute name that was configured in Step 1.
- Save the settings.
Groups Configuration In Web Console
Identical named groups with the Active Directory group names need to be created in your Org. Ensure that these groups are mapped to the appropriate Projects with the correct privileges. In the example below, the Group "OrgAdmin" is configured as an "Organization Admin" with access to all Projects.
It is important to emphasize that because of SSO via Entra ID, user lifecycle management can be completely offloaded to the IdP. In the example below, note that there are no users managed in the "OrgAdmin" group because they are all managed in the attached Entra tenant.
Step 6: Specify IdP Metadata¶
- In the Entra Admin Center browse to the Enterprise applications > Rafay > Single sign-on configuration page.
- Copy the "App Federation Metadata Url" URL from the App > SAML Certificates section.
- Navigate back to the Web Console's IdP configuration wizard.
- Paste the App Federation Metadata Url from Entra to the Identity Provider Metadata URL.
- Complete IdP Registration.
- Once this process is complete, you can view details about the IdP configuration on the Identity Provider page.
- You can also edit and update the configuration if required.