You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
> The value is not real. Update the value with the actual Sign-on URL. Contact [Datadog Client support team](mailto:support@datadoghq.com) to get the value. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
77
+
> The value is not real. Update the value with the actual Sign-on URL in your [Datadog SAML settings](https://app.datadoghq.com/organization-settings/login-methods/saml). You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal. Using IdP initiated login and SP initiated login together requires both version of the ACS URL configured in Azure.
80
78
81
79
1. Click **Save**.
82
80
83
-
1. On the **Set up single sign-on with SAML** page, in the **SAML Signing Certificate** section, find **Federation Metadata XML** and select **Download** to download the certificate and save it on your computer.
81
+
1. On the **Set up Single Sign-On with SAML** page under **User Attributes & Claims**, click the pencil icon to edit the settings.
82
+
83
+
1. Click the **Add a group claim** button. By default in Azure AD, the group claim name is a URL. For example, `http://schemas.microsoft.com/ws/2008/06/identity/claims/groups`). If you want to change this to a display name value like **groups**, select **Advanced options**, and then change the name of the group claim to **groups**.
> The source attribute is set to `Group ID`. This is the UUID of the group in Azure AD. This means that the group ID is sent by Azure AD as a group claim attribute value, not as the group name. You need to change mappings in Datadog to map to the group ID instead of to the group name. For more information, see [Datadog SAML mappings](https://docs.datadoghq.com/account_management/saml/#mapping-saml-attributes-to-datadog-roles).
86
87
87
-
1. On the **Set up Datadog** section, copy the appropriate URL(s) based on your requirement.
88
+
1. On the **Set up single sign-on with SAML**page, in the **SAML Signing Certificate**section, find **Federation Metadata XML** and select **Download** to download the certificate and save it on your computer.
1. In the **Set up Datadog** section, copy the appropriate URL(s) based on your requirement.
90
91
91
92
### Create an Azure AD test user
92
93
@@ -114,27 +115,23 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
114
115
115
116
## Configure Datadog SSO
116
117
117
-
To configure single sign-on on **Datadog** side, you need to send the downloaded **Federation Metadata XML** and appropriate copied URLs from Azure portal to [Datadog support team](mailto:[email protected]). They set this setting to have the SAML SSO connection set properly on both sides.
118
-
119
-
### Create Datadog test user
120
-
121
-
In this section, you create a user called B.Simon in Datadog. Work with [Datadog support team](mailto:[email protected]) to add the users in the Datadog platform.
118
+
To configure single sign-on on the **Datadog** side, you need to upload the downloaded **Federation Metadata XML** in the [Datadog SAML settings](https://app.datadoghq.com/organization-settings/login-methods/saml).
122
119
123
120
## Test SSO
124
121
125
-
In this section, you test your Azure AD single sign-on configuration with following options.
122
+
Test your Azure AD single sign-on configuration with following options.
126
123
127
124
#### SP initiated:
128
125
129
126
* Click on **Test this application** in Azure portal. This will redirect to Datadog Sign on URL where you can initiate the login flow.
130
127
131
-
* Go to Datadog Sign-on URL directly and initiate the login flow from there.
128
+
* Go to the Datadog Sign-on URL directly and initiate the login flow from there.
132
129
133
130
#### IDP initiated:
134
131
135
132
* Click on **Test this application** in Azure portal and you should be automatically signed in to the Datadog for which you set up the SSO.
136
133
137
-
You can also use Microsoft My Apps to test the application in any mode. When you click the Datadog tile in the My Apps, if configured in SP mode you would be redirected to the application sign on page for initiating the login flow and if configured in IDP mode, you should be automatically signed in to the Datadog for which you set up the SSO. For more information about the My Apps, see [Introduction to the My Apps](https://support.microsoft.com/account-billing/sign-in-and-start-apps-from-the-my-apps-portal-2f3b1bae-0e5a-4a86-a33e-876fbd2a4510).
134
+
You can also use Microsoft My Apps to test the application in any mode. When you click the Datadog tile in the My Apps portal, if configured in SP mode you would be redirected to the application sign on page for initiating the login flow and if configured in IDP mode, you should be automatically signed in to the Datadog for which you set up the SSO. For more information about My Apps, see [Introduction to the My Apps portal](https://support.microsoft.com/account-billing/sign-in-and-start-apps-from-the-my-apps-portal-2f3b1bae-0e5a-4a86-a33e-876fbd2a4510).
138
135
139
136
### Enable all users from your tenant to authenticate with the app
140
137
@@ -154,4 +151,4 @@ In this section, you enable everyone within your tenant to access Datadog if one
154
151
155
152
## Next steps
156
153
157
-
Once you configure Datadog you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Cloud App Security](/cloud-app-security/proxy-deployment-any-app).
154
+
Once you configure Datadog you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Cloud App Security](/cloud-app-security/proxy-deployment-any-app).
0 commit comments