Setting up Azure AD SSO
Availability: Enterprise Edition for users with Owner permissions
Azure Active Directory (AD) is one of the SAML integrations supported by the Enterprise Edition of Faros SaaS. This guide describes the steps for configuring Azure AD with Faros SaaS deployment. The configuration can include binding Faros user roles to Azure AD organizational units or groups.
Add a SAML Application
Prerequisites
An Azure AD user account with a
Global Administrator
role, aCloud Application Administrator
role, or anApplication Administrator
role
First, add an enterprise application to an Azure AD tenant by following these steps:
- Sign in to
Azure Active Directory Admin Center
. Note that your account must be authorized to add an application (see prerequisites above). - In the left menu, choose
Enterprise applications
which opens theAll applications
pane, displaying a list of the applications in the Azure AD tenant. - In the
Enterprise applications
pane, choose theNew application
option which opensBrowse Azure AD Gallery
pane, displaying tiles for on-premises applications, featured applications, and cloud platforms
- Search the gallery for
Azure AD SAML Toolkit
.
- Click on
Azure AD SAML Toolkit
to create new SAML application and name itFaros AI
, then clickCreate
.
Configure SSO for a SAML Application
- In a separate browser window log in to Faros and then click on the profile icon in the top right corner of the window. Choose
Workspace Settings
option from the drop down menu, then click theSSO
option underWorkspace
(available to users with FarosOwner
role only).
-
Select
Add New
and chooseSAML
for connection type. NoteACS URL
andEntity ID
values. You will need these when configuring Azure AD SSO next. -
Return to the Azure Active Directory Admin Center. In the left menu, choose
Enterprise applications
which opens theAll applications
pane, displaying a list of applications in the Azure AD tenant. Search for and chooseFaros AI
application you created earlier. -
In the left menu, under the
Manage
section chooseSingle sign-on
to configure SSO for the Faros AI application -
Choose
SAML
to open the SSO configuration page. -
Click on the
Edit
icon next toBasic SAML Configuration
to edit the settings.
- Fill in
Identifier (Entity ID)
field with the value of FarosEntity ID
noted in previous steps. - Fill in
Reply URL
field with the value of FarosACS URL
noted in previous steps. - Fill in
Sign on URL
withhttps://app.faros.ai/account/login
- Click
Save
- In the
SAML Certificate
section of theSingle sign-on
pane, findFederation Metadata XML
and chooseDownload
to download and save the certificate xml on your computer. - Return to the browser's window with Faros application UI, SSO setup and upload the certificate metadata xml.
- Click
Proceed
and enter the domain of your emails. These will be the emails that can login to Faros via Azure AD SSO. After clickingProceed
you will be provided a TXT record. Add it to your DNS.
- Choose default SSO Faros roles (e.g,
Viewer
role) to be assigned to all Faros users in the Azure AD. More information on roles here. Note that the default SSO roles can be overwritten by the mappings in theRoles Groups Mapping
section. To enable groups to roles mapping,groups
attribute should be configured in Azure AD -> Faros AI application -> Single Sign-On -> SAMLAttributes & Claims
section populated withusers.groups
value.
Updated about 1 month ago