How to configure SAML authentication with Microsoft Entra ID?

Zyxel_HsinBo
Zyxel_HsinBo Posts: 412  Zyxel Employee
Zyxel Certified Network Engineer Level 2 - Switch Zyxel Certified Network Engineer Level 1 - Switch Zyxel Certified Network Administrator - WLAN Zyxel Certified Network Administrator - Switch
edited January 3 in Other Topics

Download the Service Provider (SP) metadata file


The following document outlines the procedure for integration between the Self-Service Single Sign-On framework that is supported in Nebula and Microsoft Entra ID (formerly Azure Active Directory) through SAML for both IdP initiated and SP Initiated Single Sign-On.This metadata file which contains all the callback URLs (where to send the successful/unsuccessful authentication responses to) as well as the certificates to use when communicating between the trusted Service Provider (SP) and Identity Provider (IdP).

In this case, Nebula serves as the Service Provider (SP), while Microsoft Entra ID acts as the Identity Provider (IdP).


Let's create the SSID with Microsoft Entra ID(Azure AD) that will serve a Captive Portal and authenticate using SAML.

  1. Navigate to Site-wide > Configure> Access points>SSID advanced settings.
  2. Select the sign-in method and select Microsoft Entra ID(Azure AD) from the dropdown list.
  3. Click the Download Metadata XML link and save the downloaded metadata file. This will be used later in Microsoft Entra ID.  

Configuring Microsoft Entra ID


Now that we have the required information from Nebula, we can start configuring our IdP. 

  1. Start by logging into your Azure account, and opening up Azure Active Directory.
  2. From the Entra ID Portal, navigate to Azure services and select Enterprise applications.
  3. From the Enterprise Applications, select New application > Create your own application.
  4. Create your own application.
  5. Provide the application name. Select Integrate any other application you don’t find in the gallery (Non-Gallery) then select create.
  6. From the application Overview page, select Get Started in the Set up Single sign-on pane and select SAML.
  7. Choose SAML.
  8. In the Entra ID (Nebula-SAML-TEST) Enterprise Application SAML-based Sign-on page, select Upload metadata file and navigate to the saved exported file from Nebula.
  9. Click Add
  10. Confirm that the imported data is correct; then save the configuration.
  11. From the Azure Enterprise Application, Section 3: SAML Certificates, select Download the Federation Metadata XML from Entra ID then upload to Nebula later.
  12. Assign Users and Groups From the new application Overview page, select Assign Users and Groups > Add user/group
    Click on Assign users and groups.
  13. Add user/group.
  14. Select the user and assign.


Upload metadata file from Entra ID metadata file


Finally, we selected upload metadata file from Entra ID metadata file. The data is imported from the App Federation Metadata file.




Testing the Authentication


Enter the email address of the IdP account and complete the IdP login process.The browser is redirected to the Microsoft Login Portal.





HsinBo

Don't miss this great chance to upgrade your Nebula org. for free!