Skip to main content

Microsoft Entra ID

SSO Microsoft Entra ID SSO Microsoft Entra ID

To configure Microsoft Entra ID as an SSO identity provider, click the button Configure New SSO in the Single-Sign On section of the organization admin settings. Then proceed with the steps below.

Step 1. Settings

Microsoft Entra ID Step 1 Microsoft Entra ID Step 1

In the first step, select Microsoft Entra as the identity provider. Then select the e-mail domains for which you want to setup SSO with Microsoft Entra. Finally, choose how new users should be handled. Then select Next.

Step 2. Configure Entra ID

Microsoft Entra ID Step 2 Microsoft Entra ID Step 2

Copy the Identifier and the Reply URL. Then open a new browser tab or window and navigate to Microsoft Entra ID in the Microsoft Azure Portal. Select Enterprise applications from the left-hand menu.

Microsoft Azure Portal 0 Microsoft Azure Portal 0

Select Create your own application.

Microsoft Azure Portal 1 Microsoft Azure Portal 1

Enter Cluvio as the name of your app. From the options choose Integrate any other application you don't find in the gallery (Non-gallery).

Microsoft Azure Portal 2 Microsoft Azure Portal 2

Click Create at the bottom of the dialog and wait for the app creation to complete. Once created, the application detail page is shown. In the Getting Started section, select 2. Set up single sign on.

Microsoft Azure Portal 3 Microsoft Azure Portal 3

Select SAML as the SSO method.

Microsoft Azure Portal 4 Microsoft Azure Portal 4

You are now on the Microsoft Entra ID SSO setup page where a series of steps is shown. In the section of step 1 (Basic SAML Configuration), click Edit.

Microsoft Azure Portal 5 Microsoft Azure Portal 5

In the dialog that opens enter the Identifier and Reply URL shown in step 2 of the Cluvio SSO setup wizard. Then click Save.

Microsoft Azure Portal 6 Microsoft Azure Portal 6

In the section of step 2 (Attributes & Claims) click Edit.

Microsoft Azure Portal 7 Microsoft Azure Portal 7

Select Add new claim to create additional claims for firstname and lastname as shown below. The other additional claims can either be left in place or deleted, as Cluvio does not use them.

Microsoft Azure Portal 8 Microsoft Azure Portal 8

In the section of step 3 (SAML Certificates) copy the App Federation Metadata URL.

Microsoft Azure Portal 9 Microsoft Azure Portal 9

Now return to the Cluvio SSO setup wizard to proceed with step 3.

Step 3. Configure Cluvio

Microsoft Entra ID Step 3 Microsoft Entra ID Step 3

Enter the App Fedaration Metadata URL copied from the Microsoft Azure Portal at the end of the previous step. The URL will be processed automatically. When the metadata has been successfully loaded into Cluvio, the message Metadata successfully loaded! appears below the URL. Click Next to proceed to step 4.

Step 4. User Access

Microsoft Entra ID Step 4 Microsoft Entra ID Step 4

You must now enable user access on your new enterprise app in Microsoft Entra ID. Follow the instructions shown to open the Users and groups section of your enterprise app in the Microsoft Azure Portal.

Microsoft Azure Portal 10 Microsoft Azure Portal 10

Select + Add user/group to configure user access as desired. You must at least allow access for your own Microsoft Entra ID account in order to verify and thus enable the Cluvio SSO configuration in the next step.

Microsoft Azure Portal 11 Microsoft Azure Portal 11

When you have completed user access configuration for your Cluvio enterprise app, return to the Cluvio SSO setup wizard to continue with step 5.

Step 5. Verification

Microsoft Entra ID Step 5 Microsoft Entra ID Step 5

Your Cluvio SSO configuration is now complete, but in order for the configuration to be activated and SSO logins to be enabled, it must be verified. Click Verify Configuration. Cluvio will open a popup window that performs SSO authentication with your identity provider and your Cluvio email address. If you are currently authenticated with the identity provider the popup closes automatically and you see a success message.

Microsoft Entra ID Step 5 Success Microsoft Entra ID Step 5 Success

At this point, all future Cluvio logins for users with e-mail addresses in the configured domains will redirect to Microsoft Entra for authentication and Microsoft Entra will redirect back to Cluvio when authentication is successful. Click Close to close the SSO setup wizard.

Reconfiguration

To reconfigure Microsoft Entra ID SSO, select Reconfigure in the SSO config drop-down menu in the organization admin section. The following dialog is shown.

Microsoft Entra Reconfigure Microsoft Entra Reconfigure

In the Cluvio tab of the reconfiguration dialog you can see the Metadata URL that Cluvio is using to periodically check for new certificates. To inspect the metadata used by Cluvio, including the currently used certificates, select Show Metadata.

Select Reload Metadata to reload the Microsoft Entra ID SAML metadata from the metadata URL. If Cluvio detects any changes, it will be indicated in the dialog. There are two use-cases for reloading metadata: Updating certificates or changing the Cluvio SSO configuration to link with a completely new Microsoft Entra ID enterprise app. While the former needs to be done when the existing certificates expire, the latter is only necessary if you intentionally want to delete and reconfigure your Microsoft Entra ID enterprise app used for Cluvio.

In the Microsoft Entra ID tab of the reconfiguration dialog you can see the Cluvio metadata that must be used in the configuration of the Microsoft Entra ID enterprise app.

Updating Certificates

To replace an expiring certificate used by your SSO configuration, open the Microsoft Entra ID app configuration in the Microsoft Azure Portal and navigate to the Single sign-on section. Under section 3 (SAML Certificates) click Edit.

Microsoft Azure Portal Certificates Microsoft Azure Portal Certificates

Select New Certificate to add a new certificate, then click Save.

Microsoft Azure Portal Certificates New Microsoft Azure Portal Certificates New

The new certificate is initially inactive. Cluvio will pick up the new certificate automatically within 24 hours, at which point the new certificate can be activated and the old certificate removed. If you want to activate the new certificate immediately, first reconfigure the Cluvio SSO configuration by selecting Reload Metadata. The new certificate should be picked up and you should see an indication that the metadata changed. Click Save & Verify to save the changes.

Verification opens a popup that authenticates with Microsoft Entra ID using your Cluvio email address. If verification fails, the previous metadata is automatically restored.

When the changes have been saved successfully, you can activate the new certificate in Microsoft Entra ID and delete the old certificate.

Certificate Update Notifications

Cluvio periodically polls the Microsoft Entra ID metadata URL to check for new certificates and periodically checks for upcoming expiration of currently used certificates. If a new or expiring certificate is detected, an email notification is sent to the admins in your Cluvio organization.