Microsoft Entra ID

To configure Microsoft Entra ID
as an SSO identity provider, click the button Configure New SSO in the
Single-Sign On section of the organization admin settings.
Then proceed with the steps below.
Step 1. Settings

In the first step, select Microsoft Entra as the identity provider. Then select the
e-mail domains for which you want to setup SSO with Microsoft Entra. Finally, choose how
new users should be handled. Then select Next.
Step 2. Configure Entra ID

Copy the Identifier and the Reply URL. Then open a new browser tab or window
and navigate to Microsoft Entra ID in the Microsoft Azure
Portal.
Select Enterprise applications from the left-hand menu.

Select Create your own application.

Enter Cluvio as the name of your app. From the options choose Integrate any other application you don't find in the gallery (Non-gallery).

Click Create at the bottom of the dialog and wait for the app creation to complete.
Once created, the application detail page is shown. In the Getting
Started section, select 2. Set up single sign on.

Select SAML as the SSO method.

You are now on the Microsoft Entra ID SSO setup page where a series of steps is
shown. In the section of step 1 (Basic SAML Configuration), click Edit.

In the dialog that opens enter the Identifier and Reply URL shown in step 2
of the Cluvio SSO setup wizard. Then click Save.

In the section of step 2 (Attributes & Claims) click Edit.

Select Add new claim to create additional claims for firstname and lastname as shown below.
The other additional claims can either be left in place or deleted, as Cluvio
does not use them.

In the section of step 3 (SAML Certificates) copy the App Federation Metadata URL.

Now return to the Cluvio SSO setup wizard to proceed with step 3.
Step 3. Configure Cluvio

Enter the App Fedaration Metadata URL copied from the Microsoft Azure Portal at the end
of the previous step. The URL will be processed automatically. When the metadata
has been successfully loaded into Cluvio, the message Metadata successfully loaded! appears below the URL. Click Next to proceed to step 4.
Step 4. User Access

You must now enable user access on your new enterprise app in Microsoft Entra ID. Follow the instructions shown to open the Users and groups section of your enterprise app in the Microsoft Azure Portal.

Select + Add user/group to configure user access as desired. You must at least
allow access for your own Microsoft Entra ID account in order to verify and thus
enable the Cluvio SSO configuration in the next step.

When you have completed user access configuration for your Cluvio enterprise app, return to the Cluvio SSO setup wizard to continue with step 5.
Step 5. Verification

Your Cluvio SSO configuration is now complete, but in order for the configuration
to be activated and SSO logins to be enabled, it must be verified. Click Verify Configuration. Cluvio will open a popup window that performs SSO authentication
with your identity provider and your Cluvio email address. If you are currently
authenticated with the identity provider the popup closes automatically and you
see a success message.

At this point, all future Cluvio logins for users with e-mail addresses in the
configured domains will redirect to Microsoft Entra for authentication and Microsoft Entra will
redirect back to Cluvio when authentication is successful. Click Close to
close the SSO setup wizard.
Reconfiguration
To reconfigure Microsoft Entra ID SSO, select Reconfigure in the SSO config
drop-down menu in the organization admin
section. The following dialog
is shown.

In the Cluvio tab of the reconfiguration dialog you can see the Metadata URL
that Cluvio is using to periodically check for new certificates. To inspect the
metadata used by Cluvio, including the currently used certificates, select Show Metadata.
Select Reload Metadata to reload the Microsoft Entra ID SAML metadata from the
metadata URL. If Cluvio detects any changes, it will be indicated in the dialog.
There are two use-cases for reloading metadata: Updating certificates or
changing the Cluvio SSO configuration to link with a completely new Microsoft
Entra ID enterprise app. While the former needs to be done when the existing certificates
expire, the latter is only necessary if you intentionally want to delete and
reconfigure your Microsoft Entra ID enterprise app used for Cluvio.
In the Microsoft Entra ID tab of the reconfiguration dialog you can see the Cluvio metadata
that must be used in the configuration of the Microsoft Entra ID enterprise app.
Updating Certificates
To replace an expiring certificate used by your SSO configuration, open
the Microsoft Entra ID app configuration in the Microsoft Azure Portal
and navigate to the Single sign-on section. Under section 3 (SAML
Certificates) click Edit.

Select New Certificate to add a new certificate, then click Save.

The new certificate is initially inactive. Cluvio will pick up the new certificate automatically within 24 hours,
at which point the new certificate can be activated and the old certificate
removed. If you want to activate the new certificate immediately, first
reconfigure the Cluvio SSO configuration by selecting Reload Metadata. The new
certificate should be picked up and you should see an indication that the
metadata changed. Click Save & Verify to save the changes.
Verification opens a popup that authenticates with Microsoft Entra ID using your Cluvio email address. If verification fails, the previous metadata is automatically restored.
When the changes have been saved successfully, you can activate the new certificate in Microsoft Entra ID and delete the old certificate.
Cluvio periodically polls the Microsoft Entra ID metadata URL to check for new certificates and periodically checks for upcoming expiration of currently used certificates. If a new or expiring certificate is detected, an email notification is sent to the admins in your Cluvio organization.