Set up Microsoft Entra ID

Learn how to configure Single Sign-On (SSO) for your PCD environment using Microsoft Entra ID. This step-by-step guide covers prerequisites, enterprise app creation, SAML configuration, attribute mapp

Overview

Configure single sign-on (SSO) for your PCD environment using Microsoft Entra ID. This integration allows you to authenticate PCD resources through your existing Microsoft accounts.

Prerequisites

Before you begin, ensure you have:

  • Administrative access to Microsoft Entra ID

  • Administrative access to your PCD environment

  • A Linux system with Python 3 installed

  • Your PCD domain FQDN (fully qualified domain name)

Step 1: Create an Enterprise Application in Entra ID

Create a new enterprise application in Microsoft Entra ID to handle the SSO integration.

  1. Sign in to the Microsoft Entra admin center.

  2. Navigate to Entra ID > Enterprise apps > All applications.

  3. Select New application.

  1. On Browse Microsoft Entra Gallery select Create your own application.

You see options for cloud platforms, on-premises applications, and featured applications.

  1. Enter a name that you want to use to recognize the instance of the application.

  2. Select Integrate any other application you don't find in the gallery (Non-gallery).

  1. Select Create.

Step 2: Enable SAML single sign-on

Enable SAML single sign-on for your enterprise application and configure the connection settings between Entra ID and your Private Cloud Director environment, while assigning user account to the application.

  1. Sign in to the Microsoft Entra admin center and then navigate to Browse to Entra ID > Enterprise apps > All applications.

  2. Enter the name of the existing application in the search box, and then select the application from the search results.

  3. Navigate to Manage and then select Single sign-on

  4. Select SAML as the single sign-on method.

  1. On Basic SAML Configuration, select Edit and then configure the following required fields.

Field
Description

Identifier (Entity ID)

https://<DU_FQDN>/keystone

Reply URL (Assertion Consumer Service URL):

https://<DU_FQDN>/sso/IDP1/Shibboleth.sso/SAML2/POST

NOTE

Replace <DU_FQDN> with your actual domain FQDN without the region name.

e.g. use companyx instead companyx-regionone

Optionally, you can choose to enter information to the optional fields.

  1. Select Save.

  2. On the Attributes & Claims, select Add a group claim and then configure the group settings according to your requirements.

  1. Copy and securely save the App Federation Metadata URL value. You will require this URL during the PCD environment configuration.

  1. To assign users or groups to the application, perform the following steps.

  • Navigate to Entra ID > Enterprise apps > All applications

  • Select Users and groups and then select Add user/group

After assigning the user to the application, ensure that the application is set to be visible to the user. To make it visible to assigned users, select Properties and then set Visible to users? to Yes.

Your SAML single sign-on configuration is complete.

Step 3: Generate Attribute Mapping Files

Create the required attribute mapping files using the federation metadata from your Entra ID application.

  1. On your Linux system with Python 3, download the federation metadata using the wget command:

wget https://login.microsoftonline.com/YOUR_TENANT_ID/federationmetadata/2007-06/federationmetadata.xml?appid=YOUR_APP_ID

Replace YOUR_TENANT_ID and YOUR_APP_ID with the actual values from your App Federation Metadata URL.

  1. Generate the attribute mapping file by running the following script against the federation metadata XML file.

./adfs-metadata-parse.py federationmetadata.xml > attribute_map.xml
  1. Verify the generated file contains the correct attribute mappings.

Your attribute mapping file is ready.

Step 4: Configure PCD SSO Settings

Configure your PCD environment to use the Entra ID SSO integration.

  1. Log in to your PCD administrative interface.

  2. Navigate to Settings > Enterprise SSO.

  3. On the Enterprise SSO, enable SSO and configure the following settings.

Field
Description

SSO Provider

Selection from the available options

Entity ID

Copy the Microsoft Entra Identifier from your Entra ID application configuration.

SAML Metadata URL

Enter the App Federation Metadata URL from your Entra ID application.

SSO Provider Attribute MAP in XML

Copy and paste the contents of the attribute_map.xml file you generated

  1. Select Save.

  2. Select SAML Groups.

  3. Select Add Group to create a new SAML group.

  4. Configure the SAML group settings.

Field

Description

Group Settings

When setting up SAML for your product, fill in the following required fields under Group Settings: - Name: Enter a unique name for the group. - Description: Provide a brief description of the group. - SAML Attribute Key for First Name: Enter the attribute key for the user's first name, (for example, givenname). - SAML Attribute Key for Last Name: Enter the attribute key for the user's last name (for example, surname). - SAML Attribute Key for Email: Enter the attribute key for the user's email address (for example, email). The attribute keys must match those configured in your identity provider’s attribute_map.xml file.

Group Mapping

Tenants & Roles

Assign users to appropriate tenants and roles (Administrator or Self-Service User)

  1. Select Save.

Your PCD SSO configuration is now complete.

Step 5: Test Your SSO Configuration

Verify that your SSO integration works correctly.

  1. Log out of your current PCD session.

  2. Open a new private or incognito browser window.

  3. Navigate to your PCD login page.

  4. Select Sign In with SSO.

  5. Complete the authentication process using your Microsoft credentials.

  6. Verify you can access PCD resources according to your assigned role.

You have now successfully configured SSO integration between PCD and Microsoft Entra ID. Users can now authenticate using their existing Microsoft accounts and access PCD resources based on their assigned roles and permissions.

Last updated

Was this helpful?