Skip to content

Setting up SAML to EntraID (previously Azure AD)

Introduction

Setting up Nanitor to support login with Microsoft EntraID (previously Azure AD) is fairly straightforward. You will need to be a system administrator in Nanitor and a domain admin in Microsoft EntraID to set up the integration.

Downloading Service Provider Metadata

You need to start by downloading an XML file from Nanitor that you then need to upload to EntraID containing various settings. Here is how you do that:

Start by logging in to Nanitor with your system admin credentials, then click on the wheel in the upper right and select System Management. If System management isn't available, then your user probably does not have system admin permissions (note that having organization admin permissions is not enough). You can contact another Nanitor system admin or submit a support ticket to Nanitor to gain system admin access.

system management

Next, select SAML identity providers in the left bar:

system management menu

Then click the three dots and "Download service provider metadata":

Download option

Create an enterprise app in EntraID

Log into Microsoft EntraID with the appropriate administrative credentials. Expand Identity and Applications, then click on Enterprise Applications and New Application.

Enterprise applications

This takes you into the Microsoft Entra Gallery. There, you need to click "Create your own application".

Entra Gallery

Provide a name that makes sense to you and leave the default setting alone. Ignore any recommendations that come up and click create at the bottom of the modal.

create your own

There will be a momentary pause as the application is being created. Once it is ready you will pop into the overview for this new application. Click on #2, "Set up single sign on".

Application Overview

From the next screen, select SAML.

SSO

Now we can start configuring the application. Click on "Upload metadata file" near the top and upload the XML file you downloaded from the Nanitor system at the start of this journey.

saml sso

On the next screen, confirm that there are no errors and that the Reply URL starts out the same as the URL you use to log into your system. If it doesn't, you may have uploaded the wrong XML file. If everything is good, all you have to do is click on Save near the top, then close the modal.

Basic SAML

I recommend you skip testing the connection at this point and click on "No, I'll test later".

Next, we need to update the Attributes & Claims, so click the three dots and edit:

sso saml

Click on "Add group claim".

attr

Select All groups and click Save. Leave the Source Attribute at the default Group ID.

group claim

The next thing we need to do is to specify what users or groups will have access to this application. For that click on "Users and Groups" in the left bar, then "Add user/group" near the top.

users and groups

Once you have that selected, click on assign. Then go back to Single sign-on in the left and find the App Federation Metadata URL, then copy that to your clipboard. You will need to paste this into Nanitor.

App Federation URL

Configuring Nanitor System

Now go back to your Nanitor instance, to the SAML identity provider screen you were on at the start of this journey, and click on "Add identity provider".

add identity provider

Provide a name that makes sense and paste in the URL you just copied and click ADD.

add provider

Note that the login screen will prefix the name you provide here with "Sign in with ". So if you use the string "EntraID" as I did in this example then the login screen will add a button with the text "Sign in with EntraID".

Mapping User Groups with Nanitor Privileges

The only thing left now is to map an EntraID user group to a Nanitor privilege. For this you need to start by grabbing the ObjectID from EntraID.

GroupID

Then you come back to Nanitor and go into Organization management

Org Management

Select Users on the left and SAML Permissions, then click on "Add SAML permission"

SAML permission

Select the name you selected above ("EntraID" in this example), the role you want to assign, and the Object ID you copied from EntraID. Then click Add SAML. Repeat for all other permissions you want to assign.

permission screen

That's all, folks; you're all done. As always, if you have any issues or questions reach out to our support team. The link to the ticketing system is in the footer of this site.