Skip to content

Commit cf3cf10

Browse files
authored
Merge pull request #195463 from bhavana-129/forcepoint
Product Backlog Item 1862168: SaaS App Tutorial: Forcepoint Cloud Sec…
2 parents 25455af + ccf9eea commit cf3cf10

File tree

3 files changed

+156
-0
lines changed

3 files changed

+156
-0
lines changed
Lines changed: 154 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,154 @@
1+
---
2+
title: 'Tutorial: Azure AD SSO integration with Forcepoint Cloud Security Gateway - User Authentication'
3+
description: Learn how to configure single sign-on between Azure Active Directory and Forcepoint Cloud Security Gateway - User Authentication.
4+
services: active-directory
5+
author: jeevansd
6+
manager: CelesteDG
7+
ms.reviewer: CelesteDG
8+
ms.service: active-directory
9+
ms.subservice: saas-app-tutorial
10+
ms.workload: identity
11+
ms.topic: tutorial
12+
ms.date: 04/19/2022
13+
ms.author: jeedes
14+
15+
---
16+
17+
# Tutorial: Azure AD SSO integration with Forcepoint Cloud Security Gateway - User Authentication
18+
19+
In this tutorial, you'll learn how to integrate Forcepoint Cloud Security Gateway - User Authentication with Azure Active Directory (Azure AD). When you integrate Forcepoint Cloud Security Gateway - User Authentication with Azure AD, you can:
20+
21+
* Control in Azure AD who has access to Forcepoint Cloud Security Gateway - User Authentication.
22+
* Enable your users to be automatically signed-in to Forcepoint Cloud Security Gateway - User Authentication with their Azure AD accounts.
23+
* Manage your accounts in one central location - the Azure portal.
24+
25+
## Prerequisites
26+
27+
To get started, you need the following items:
28+
29+
* An Azure AD subscription. If you don't have a subscription, you can get a [free account](https://azure.microsoft.com/free/).
30+
* Forcepoint Cloud Security Gateway - User Authentication single sign-on (SSO) enabled subscription.
31+
* Along with Cloud Application Administrator, Application Administrator can also add or manage applications in Azure AD.
32+
For more information, see [Azure built-in roles](../roles/permissions-reference.md).
33+
34+
## Scenario description
35+
36+
In this tutorial, you configure and test Azure AD SSO in a test environment.
37+
38+
* Forcepoint Cloud Security Gateway - User Authentication supports **SP** initiated SSO.
39+
40+
> [!NOTE]
41+
> Identifier of this application is a fixed string value so only one instance can be configured in one tenant.
42+
43+
## Add Forcepoint Cloud Security Gateway - User Authentication from the gallery
44+
45+
To configure the integration of Forcepoint Cloud Security Gateway - User Authentication into Azure AD, you need to add Forcepoint Cloud Security Gateway - User Authentication from the gallery to your list of managed SaaS apps.
46+
47+
1. Sign in to the Azure portal using either a work or school account, or a personal Microsoft account.
48+
1. On the left navigation pane, select the **Azure Active Directory** service.
49+
1. Navigate to **Enterprise Applications** and then select **All Applications**.
50+
1. To add new application, select **New application**.
51+
1. In the **Add from the gallery** section, type **Forcepoint Cloud Security Gateway - User Authentication** in the search box.
52+
1. Select **Forcepoint Cloud Security Gateway - User Authentication** from results panel and then add the app. Wait a few seconds while the app is added to your tenant.
53+
54+
## Configure and test Azure AD SSO for Forcepoint Cloud Security Gateway - User Authentication
55+
56+
Configure and test Azure AD SSO with Forcepoint Cloud Security Gateway - User Authentication using a test user called **B.Simon**. For SSO to work, you need to establish a link relationship between an Azure AD user and the related user in Forcepoint Cloud Security Gateway - User Authentication.
57+
58+
To configure and test Azure AD SSO with Forcepoint Cloud Security Gateway - User Authentication, perform the following steps:
59+
60+
1. **[Configure Azure AD SSO](#configure-azure-ad-sso)** - to enable your users to use this feature.
61+
1. **[Create an Azure AD test user](#create-an-azure-ad-test-user)** - to test Azure AD single sign-on with B.Simon.
62+
1. **[Assign the Azure AD test user](#assign-the-azure-ad-test-user)** - to enable B.Simon to use Azure AD single sign-on.
63+
1. **[Configure Forcepoint Cloud Security Gateway - User Authentication SSO](#configure-forcepoint-cloud-security-gateway---user-authentication-sso)** - to configure the single sign-on settings on application side.
64+
1. **[Create Forcepoint Cloud Security Gateway - User Authentication test user](#create-forcepoint-cloud-security-gateway---user-authentication-test-user)** - to have a counterpart of B.Simon in Forcepoint Cloud Security Gateway - User Authentication that is linked to the Azure AD representation of user.
65+
1. **[Test SSO](#test-sso)** - to verify whether the configuration works.
66+
67+
## Configure Azure AD SSO
68+
69+
Follow these steps to enable Azure AD SSO in the Azure portal.
70+
71+
1. In the Azure portal, on the **Forcepoint Cloud Security Gateway - User Authentication** application integration page, find the **Manage** section and select **single sign-on**.
72+
1. On the **Select a single sign-on method** page, select **SAML**.
73+
1. On the **Set up single sign-on with SAML** page, click the pencil icon for **Basic SAML Configuration** to edit the settings.
74+
75+
![Edit Basic SAML Configuration](common/edit-urls.png)
76+
77+
1. On the **Basic SAML Configuration** section, perform the following steps:
78+
79+
a. In the **Identifier** text box, type the URL:
80+
`https://mailcontrol.com/sp_metadata.xml`
81+
82+
b. In the **Reply URL** text box, type the URL:
83+
`https://proxy-login.blackspider.com/`
84+
85+
c. In the **Sign-on URL** text box, type the URL:
86+
`https://mailcontrol.com`
87+
88+
1. On the **Set up Single Sign-On with SAML** page, in the **SAML Signing Certificate** section, find **Certificate (Base64)** and select **Download** to download the certificate and save it on your computer.
89+
90+
![The Certificate download link](common/certificatebase64.png)
91+
92+
1. On the **Set up Forcepoint Cloud Security Gateway - User Authentication** section, copy the appropriate URL(s) based on your requirement.
93+
94+
![Copy configuration URLs](common/copy-configuration-urls.png)
95+
96+
### Create an Azure AD test user
97+
98+
In this section, you'll create a test user in the Azure portal called B.Simon.
99+
100+
1. From the left pane in the Azure portal, select **Azure Active Directory**, select **Users**, and then select **All users**.
101+
1. Select **New user** at the top of the screen.
102+
1. In the **User** properties, follow these steps:
103+
1. In the **Name** field, enter `B.Simon`.
104+
1. In the **User name** field, enter the [email protected]. For example, `[email protected]`.
105+
1. Select the **Show password** check box, and then write down the value that's displayed in the **Password** box.
106+
1. Click **Create**.
107+
108+
### Assign the Azure AD test user
109+
110+
In this section, you'll enable B.Simon to use Azure single sign-on by granting access to Forcepoint Cloud Security Gateway - User Authentication.
111+
112+
1. In the Azure portal, select **Enterprise Applications**, and then select **All applications**.
113+
1. In the applications list, select **Forcepoint Cloud Security Gateway - User Authentication**.
114+
1. In the app's overview page, find the **Manage** section and select **Users and groups**.
115+
1. Select **Add user**, then select **Users and groups** in the **Add Assignment** dialog.
116+
1. In the **Users and groups** dialog, select **B.Simon** from the Users list, then click the **Select** button at the bottom of the screen.
117+
1. If you are expecting a role to be assigned to the users, you can select it from the **Select a role** dropdown. If no role has been set up for this app, you see "Default Access" role selected.
118+
1. In the **Add Assignment** dialog, click the **Assign** button.
119+
120+
## Configure Forcepoint Cloud Security Gateway - User Authentication SSO
121+
122+
1. Log in to your Forcepoint Cloud Security Gateway - User Authentication company site as an administrator.
123+
124+
1. Go to **Web** > **SETTINGS** and click **Single Sign-On**.
125+
126+
1. In the **Single Sign-On** page, perform the following steps:
127+
128+
![Screenshot that shows the Single Sign-On Configuration.](./media/forcepoint-cloud-security-gateway-tutorial/general.png "Configuration")
129+
130+
a. Enable **Use identity provider for single sign-on** checkbox.
131+
132+
b. Select **Identity provider** from the dropdown.
133+
134+
c. Open the downloaded **Certificate (Base64)** from the Azure portal and upload the file into the **File upload** textbox by clicking **Browse** option.
135+
136+
d. Click **Save**.
137+
138+
### Create Forcepoint Cloud Security Gateway - User Authentication test user
139+
140+
In this section, you create a user called Britta Simon in Forcepoint Cloud Security Gateway - User Authentication. Work with [Forcepoint Cloud Security Gateway - User Authentication support team](mailto:[email protected]) to add the users in the Forcepoint Cloud Security Gateway - User Authentication platform. Users must be created and activated before you use single sign-on.
141+
142+
## Test SSO
143+
144+
In this section, you test your Azure AD single sign-on configuration with following options.
145+
146+
* Click on **Test this application** in Azure portal. This will redirect to Forcepoint Cloud Security Gateway - User Authentication Sign-on URL where you can initiate the login flow.
147+
148+
* Go to Forcepoint Cloud Security Gateway - User Authentication Sign-on URL directly and initiate the login flow from there.
149+
150+
* You can use Microsoft My Apps. When you click the Forcepoint Cloud Security Gateway - User Authentication tile in the My Apps, this will redirect to Forcepoint Cloud Security Gateway - User Authentication Sign-on URL. For more information about the My Apps, see [Introduction to the My Apps](https://support.microsoft.com/account-billing/sign-in-and-start-apps-from-the-my-apps-portal-2f3b1bae-0e5a-4a86-a33e-876fbd2a4510).
151+
152+
## Next steps
153+
154+
Once you configure Forcepoint Cloud Security Gateway - User Authentication you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Defender for Cloud Apps](/cloud-app-security/proxy-deployment-any-app).
111 KB
Loading

articles/active-directory/saas-apps/toc.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -854,6 +854,8 @@
854854
href: folloze-tutorial.md
855855
- name: Foodee
856856
href: foodee-tutorial.md
857+
- name: Forcepoint Cloud Security Gateway - User Authentication
858+
href: forcepoint-cloud-security-gateway-tutorial.md
857859
- name: ForeSee CX Suite
858860
href: foreseecxsuite-tutorial.md
859861
- name: Form.com

0 commit comments

Comments
 (0)