Configuring SAML with Entra ID
Follow these instructions to configure Entra ID as your SAML IdP.
How to configure SAML with Entra ID
- Log in to the Microsoft Azure Portal.
- In the left-hand panel, click MicrosoftEntra ID.
- Under Manage, click Enterprise applications.
- At the top of the page, click New application.
- Click Non-gallery application.
- In the Name field, type
FortiDLP
. - Click Add.
- In the Getting started section, click Assign users and groups, and then add your operators as needed.
- In the left-hand panel, click Single sign-on.
- Click SAML.
- In the Basic SAML Configuration panel, click .
- In the Identifier (Entity ID) field, paste the Entity ID you obtained from the FortiDLP Console.
- In the Reply URL (Assertion Consumer Service URL) field, paste the ACS URL you obtained from the FortiDLP Console.
- At the top of the Basic SAML Configuration panel, click Save.
- In the User Attributes & Claims panel, click .
- Configure your attributes, which are known as claims in Entra ID:
- To configure the role attribute:
- Click Add new claim again.
- In the Name field, paste
https://jazznetworks.com/SAML/Attributes/Role
. - In the Source attribute menu, select your preferred role attribute name. This can be an existing attribute or a new custom attribute you create using these instructions. The attribute value must correspond to at least one role in the FortiDLP Infrastructure.
- Click Save.
- To configure the login name attribute:
- At the top of the User Attributes & Claims panel, click Add new claim.
- In the Name field, type
Email
or your preferred login name attribute name. - In the Source attribute menu, select user.mail.
- Click Save.
- To configure first and last name attributes:
- At the top of the User Attributes & Claims panel, click Add new claim.
- In the Name field, type
FirstName
. - In the Source attribute menu, select user.givenname.
- Click Save.
- Click Add new claim again.
- In the Name field, type
LastName
. - In the Source attribute menu, select user.surname.
- Click Save.
- To configure the role attribute:
- In the Additional claims section, delete all default claims so that only the previously configured claims are shown.
- On the menu bar, click SAML-based Sign-on.
- In the SAML Signing Certificate section, click .
- In the Signing Option menu, select Sign SAML response and assertion.
- Click Save.
- In the SAML Signing Certificate section, beside Federation Metadata XML, click Download.
To finish configuring SAML, see Configuring IdP metadata and attributes.