Skip to content

Commit d858753

Browse files
authored
Merge pull request #195457 from bhavana-129/beatrustt
Product Backlog Item 1858854: SaaS App Tutorial: Beatrust
2 parents 8836227 + c735e5a commit d858753

File tree

2 files changed

+145
-0
lines changed

2 files changed

+145
-0
lines changed
Lines changed: 143 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,143 @@
1+
---
2+
title: 'Tutorial: Azure AD SSO integration with Beatrust'
3+
description: Learn how to configure single sign-on between Azure Active Directory and Beatrust.
4+
services: active-directory
5+
author: jeevansd
6+
manager: CelesteDG
7+
ms.reviewer: CelesteDG
8+
ms.service: active-directory
9+
ms.subservice: saas-app-tutorial
10+
ms.workload: identity
11+
ms.topic: tutorial
12+
ms.date: 04/13/2022
13+
ms.author: jeedes
14+
15+
---
16+
17+
# Tutorial: Azure AD SSO integration with Beatrust
18+
19+
In this tutorial, you'll learn how to integrate Beatrust with Azure Active Directory (Azure AD). When you integrate Beatrust with Azure AD, you can:
20+
21+
* Control in Azure AD who has access to Beatrust.
22+
* Enable your users to be automatically signed-in to Beatrust with their Azure AD accounts.
23+
* Manage your accounts in one central location - the Azure portal.
24+
25+
## Prerequisites
26+
27+
To get started, you need the following items:
28+
29+
* An Azure AD subscription. If you don't have a subscription, you can get a [free account](https://azure.microsoft.com/free/).
30+
* Beatrust single sign-on (SSO) enabled subscription.
31+
* Along with Cloud Application Administrator, Application Administrator can also add or manage applications in Azure AD.
32+
For more information, see [Azure built-in roles](../roles/permissions-reference.md).
33+
34+
## Scenario description
35+
36+
In this tutorial, you configure and test Azure AD SSO in a test environment.
37+
38+
* Beatrust supports **SP** initiated SSO.
39+
40+
> [!NOTE]
41+
> Identifier of this application is a fixed string value so only one instance can be configured in one tenant.
42+
43+
## Add Beatrust from the gallery
44+
45+
To configure the integration of Beatrust into Azure AD, you need to add Beatrust from the gallery to your list of managed SaaS apps.
46+
47+
1. Sign in to the Azure portal using either a work or school account, or a personal Microsoft account.
48+
1. On the left navigation pane, select the **Azure Active Directory** service.
49+
1. Navigate to **Enterprise Applications** and then select **All Applications**.
50+
1. To add new application, select **New application**.
51+
1. In the **Add from the gallery** section, type **Beatrust** in the search box.
52+
1. Select **Beatrust** from results panel and then add the app. Wait a few seconds while the app is added to your tenant.
53+
54+
## Configure and test Azure AD SSO for Beatrust
55+
56+
Configure and test Azure AD SSO with Beatrust using a test user called **B.Simon**. For SSO to work, you need to establish a link relationship between an Azure AD user and the related user in Beatrust.
57+
58+
To configure and test Azure AD SSO with Beatrust, perform the following steps:
59+
60+
1. **[Configure Azure AD SSO](#configure-azure-ad-sso)** - to enable your users to use this feature.
61+
1. **[Create an Azure AD test user](#create-an-azure-ad-test-user)** - to test Azure AD single sign-on with B.Simon.
62+
1. **[Assign the Azure AD test user](#assign-the-azure-ad-test-user)** - to enable B.Simon to use Azure AD single sign-on.
63+
1. **[Configure Beatrust SSO](#configure-beatrust-sso)** - to configure the single sign-on settings on application side.
64+
1. **[Create Beatrust test user](#create-beatrust-test-user)** - to have a counterpart of B.Simon in Beatrust that is linked to the Azure AD representation of user.
65+
1. **[Test SSO](#test-sso)** - to verify whether the configuration works.
66+
67+
## Configure Azure AD SSO
68+
69+
Follow these steps to enable Azure AD SSO in the Azure portal.
70+
71+
1. In the Azure portal, on the **Beatrust** application integration page, find the **Manage** section and select **single sign-on**.
72+
1. On the **Select a single sign-on method** page, select **SAML**.
73+
1. On the **Set up single sign-on with SAML** page, click the pencil icon for **Basic SAML Configuration** to edit the settings.
74+
75+
![Edit Basic SAML Configuration](common/edit-urls.png)
76+
77+
1. On the **Basic SAML Configuration** section, perform the following steps:
78+
79+
a. In the **Identifier** text box, type the URL:
80+
`https://beatrust.com`
81+
82+
b. In the **Reply URL** text box, type the URL:
83+
`https://auth.beatrust.com/__/auth/handler`
84+
85+
c. In the **Sign-on URL** text box, type a URL using of the following pattern:
86+
`https://beatrust.com/<org_key>
87+
88+
> [!NOTE]
89+
> The Sign-on URL value is not real. Update the value with the actual Sign-on URL. Contact [Beatrust Client support team](mailto:[email protected]) to get the value. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
90+
91+
1. On the **Set up single sign-on with SAML** page, in the **SAML Signing Certificate** section, find **Certificate (Base64)** and select **Download** to download the certificate and save it on your computer.
92+
93+
![The Certificate download link](common/certificatebase64.png)
94+
95+
1. On the **Set up Beatrust** section, copy the appropriate URL(s) based on your requirement.
96+
97+
![Copy configuration URLs](common/copy-configuration-urls.png)
98+
99+
### Create an Azure AD test user
100+
101+
In this section, you'll create a test user in the Azure portal called B.Simon.
102+
103+
1. From the left pane in the Azure portal, select **Azure Active Directory**, select **Users**, and then select **All users**.
104+
1. Select **New user** at the top of the screen.
105+
1. In the **User** properties, follow these steps:
106+
1. In the **Name** field, enter `B.Simon`.
107+
1. In the **User name** field, enter the [email protected]. For example, `[email protected]`.
108+
1. Select the **Show password** check box, and then write down the value that's displayed in the **Password** box.
109+
1. Click **Create**.
110+
111+
### Assign the Azure AD test user
112+
113+
In this section, you'll enable B.Simon to use Azure single sign-on by granting access to Beatrust.
114+
115+
1. In the Azure portal, select **Enterprise Applications**, and then select **All applications**.
116+
1. In the applications list, select **Beatrust**.
117+
1. In the app's overview page, find the **Manage** section and select **Users and groups**.
118+
1. Select **Add user**, then select **Users and groups** in the **Add Assignment** dialog.
119+
1. In the **Users and groups** dialog, select **B.Simon** from the Users list, then click the **Select** button at the bottom of the screen.
120+
1. If you are expecting a role to be assigned to the users, you can select it from the **Select a role** dropdown. If no role has been set up for this app, you see "Default Access" role selected.
121+
1. In the **Add Assignment** dialog, click the **Assign** button.
122+
123+
## Configure Beatrust SSO
124+
125+
To configure single sign-on on **Beatrust** side, you need to send the downloaded **Certificate (Base64)** and appropriate copied URLs from Azure portal to [Beatrust support team](mailto:[email protected]). They set this setting to have the SAML SSO connection set properly on both sides.
126+
127+
### Create Beatrust test user
128+
129+
In this section, you create a user called Britta Simon in Beatrust. Work with [Beatrust support team](mailto:[email protected]) to add the users in the Beatrust platform. Users must be created and activated before you use single sign-on.
130+
131+
## Test SSO
132+
133+
In this section, you test your Azure AD single sign-on configuration with following options.
134+
135+
* Click on **Test this application** in Azure portal. This will redirect to Beatrust Sign-on URL where you can initiate the login flow.
136+
137+
* Go to Beatrust Sign-on URL directly and initiate the login flow from there.
138+
139+
* You can use Microsoft My Apps. When you click the Beatrust tile in the My Apps, this will redirect to Beatrust Sign-on URL. For more information about the My Apps, see [Introduction to the My Apps](https://support.microsoft.com/account-billing/sign-in-and-start-apps-from-the-my-apps-portal-2f3b1bae-0e5a-4a86-a33e-876fbd2a4510).
140+
141+
## Next steps
142+
143+
Once you configure Beatrust you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Defender for Cloud Apps](/cloud-app-security/proxy-deployment-any-app).

articles/active-directory/saas-apps/toc.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -249,6 +249,8 @@
249249
href: bcinthecloud-tutorial.md
250250
- name: Bealink
251251
href: bealink-tutorial.md
252+
- name: Beatrust
253+
href: beatrust-tutorial.md
252254
- name: Beekeeper Azure AD Data Connector
253255
href: beekeeper-azure-ad-data-connector-tutorial.md
254256
- name: BeeLine

0 commit comments

Comments
 (0)