Microsoft SSO Integration With Cyber Crucible Dashboard
Clients can integrate their Microsoft Entra ID (Azure AD) SSO with the Cyber Crucible dashboard by following these steps below:
Client updates in the Entra ID SAML config
First, go to Enterprise applications and click the desired app
If you do not have one yet, then click create New application inside the Enterprise applications section.
Enter your app name and click the “(Preview) Integrate any other application you don't find in the gallery (Non-gallery)” setting for the “What are you looking to do with your application?” field
Edit the Basic SAML Configuration in the enterprise app, do this by clicking the Single sign-on setting under Manage and click edit in the Basic SAML Configuration section
In the “Identifier (Entity ID)” field, enter ‘urn:amazon:cognito:sp:us-west-2_6RUYJsSaq’
In the “Reply URL (Assertion Consumer Service URL)” field, enter “https://auth.ransomwarerewind.com/saml2/idpresponse”
The config should look like this:
After saving the Basic SAML Config, click Edit in the Attributes & Claims Section
THIS NEXT STEP IS REQUIRED
Click the Required claim titled “Unique User Identifier (Name ID)” to edit it
Then edit and save the claim as follows
The Name identifier format should be Email address
The Source attribute should be “user.mail”
This field will be the identifier in the access tokens we see in the rest server
Get in contact with Cyber Crucible to pass information over as this information is needed for Cyber Crucible’s updates in AWS Cognito. We will need the following information
The “App Federation Metadata Url” value under the SAML Certificates section in the clients Entra ID Enterprise App
Clients should go to the “Attributes & Claims” section on the Single sign-on settings. Under the Additional claims section we need the schemas found in the Claim name section
Cyber Crucible will make a new domain for users to use in order to login to the dashboard using the SSO setup above