Microsoft Entra ID SSO
Configure Single Sign-On (SSO) with Microsoft Entra ID to secure access to Asset Panda. This setup allows you to sign in with Microsoft Entra ID credentials, enhancing security and simplifying user access management.
Prerequisites
To configure SSO between Asset Panda and Microsoft Entra ID, ensure the following details are available:
Administrative access to Microsoft Entra ID
Entity ID and Reply URL provided by Asset Panda
Access to the Enterprise Applications section in Microsoft Entra ID
Warning: Microsoft Entra IDs interface and options may evolve. Refer to the Microsoft Entra ID Documentation for additional context and reference.
Search or Create an Enterprise Application
To set up SSO, search for or create an Enterprise Application in Microsoft Entra ID:
Sign in to the Microsoft Entra ID portal.
Search for Microsoft Entra ID in the search bar and open it.
Go to Microsoft Entra ID > Enterprise Applications.
Search for and open the application.
If there is no application, create a new one:
Click New application.
Choose Create your own application.
Enter a name and select Integrate any other application you don’t find in the gallery (Non-gallery).
Click Create.
Configure SAML-based Single Sign-On
To configure the SSO settings between Asset Panda and Microsoft Entra ID:
In the Enterprise Applications, select Single Sign-On and choose SAML.
Edit the Basic SAML Configuration.
Enter the Identifier (Entity ID) as urn:amazon:cognito:sp:us-east-1_4jHsDgxlC
Enter the Reply URL (Assertion Consumer Service URL) as https://ap-pioneer-951730251621.auth.us-east-1.amazoncognito.com/saml2/idpresponse
Click Save.
Edit User Attributes & Claims:
Ensure the email address claim is mapped
Add a new claim if necessary:
Set the Name to the
email address.Set the Source Attribute to
user.mail.Save the claim.
Download the SAML Metadata File:
Go to the SAML Signing Certificate section.
Select Download next to Federation Metadata XML.
Use this file to complete the Microsoft Entra ID Integration setup with Asset Panda.
Assign Users and Groups
In the Enterprise Applications, go to Users and Groups.
Click Add user/group.
Choose the users or groups to enable SSO.
Click Assign.
Assigned users can access Asset Panda through SSO.
Complete the Microsoft Entra ID Integration Setup with Asset Panda
Return to Enterprise Applications and verify that the correct tenant is selected.
Ensure that all necessary users are assigned to Users and Groups.
Upload the downloaded SAML Metadata File to Asset Panda to complete the integration.
Test the setup to confirm users can sign in using their Microsoft Entra ID credentials.
Microsoft Entra ID Integration with Asset Panda is now complete. Assigned users can sign in with their Microsoft Entra ID credentials. If any issues arise, verify the setup, permissions, and assigned users.
Uploading the SAML Metadata File to Asset Panda
To complete the SSO setup, upload the SAML Metadata File in Asset Panda:
Log in to Asset Panda as an admin.
Go to Settings > Preferences > Single sign-on (SSO) in Asset Panda.
Click Add new SSO.
Choose the Enable Type: This setting determines who can access Asset Panda through SSO based on your organization’s requirements:
Enable for all users: Enables SSO for all users in your organization, allowing them to authenticate using their Microsoft Entra ID or other identity provider credentials.
Enable for selected domains: Restricts SSO to users with email addresses from specific domains.
Disable for all users: Disables SSO for all users, preventing authentication via Microsoft Entra ID or other identity provider credentials.
Enter a Connection Name. This name will appear during the login process.
Upload the downloaded Metadata XML file. This file contains the necessary configuration to establish a secure connection between Asset Panda and your identity provider for SSO.
Click Save to complete the configuration.
Last updated

