You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
I've added instructions on how to configure Azure Active Directory and cloudtamer.io for group assertions. This allows a user to inherit permissions based on membership in an Azure Active Directory group.
Copy file name to clipboardExpand all lines: articles/active-directory/saas-apps/cloudtamer-io-tutorial.md
+30-1Lines changed: 30 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -175,7 +175,36 @@ In this section, you test your Azure AD single sign-on configuration with follow
175
175
176
176
You can also use Microsoft My Apps to test the application in any mode. When you click the cloudtamer.io tile in the My Apps, if configured in SP mode you would be redirected to the application sign on page for initiating the login flow and if configured in IDP mode, you should be automatically signed in to the cloudtamer.io for which you set up the SSO. For more information about the My Apps, see [Introduction to the My Apps](https://support.microsoft.com/account-billing/sign-in-and-start-apps-from-the-my-apps-portal-2f3b1bae-0e5a-4a86-a33e-876fbd2a4510).
177
177
178
+
## Group Assertions
179
+
180
+
In order to easily manage cloudtamer.io user permissions using existing Azure Active Directory groups, you can follow the steps below:
181
+
182
+
### Azure Active Directory Configuration
183
+
1. Within Azure Active Directory, navigate to Azure Active Directory > Enterprise Applications.
184
+
2. Select the Enterprise Application for cloudtamer.io from the list.
185
+
3. On the Overview screen that appears, select **Single sign-on** from the menu on the left.
186
+
4. On the Single Sign-On screen, locate the User Attributes & Claims box and select **Edit**.
187
+
5. Select **Add a group claim** from the top. (Note: You can only have one group claim. If this option is disabled, you may already have a group claim defined.)
188
+
6. On the Group Claims screen that appears, make a selection for the groups that should be returned in the claim:
189
+
1. If you will always have every group you intend to use in cloudtamer.io assigned to this Enterprise Application, select **Groups assigned to the application**.
190
+
1. Otherwise, if you want all groups to appear (this can cause a large number of group assertions and may be subject to limits), select **Groups assigned to the application**.
191
+
7. For **Source attribute**, leave Group ID by default.
192
+
8. Place a checkmark in the box labeled **Customize the name of the group claim** and specify the name **memberOf** in the **Name** field.
193
+
9. Select **Save** to complete the configuration with Azure Active Directory.
194
+
195
+
### cloudtamer.io Configuration
196
+
1. Within cloudtamer.io, navigate to Users > Identity Management Systems.
197
+
2. Select the IDMS that you've created for Azure Active Directory.
198
+
3. On the overview screen that appears, select the User Group Associations tab.
199
+
4. For each user group mapping you desire, follow these steps:
200
+
1. Select Add > Add New.
201
+
1. On the dialog that appears:
202
+
1. In the Name field, specify **memberOf**.
203
+
1. In the Regex field, specify the Object Id (from Azure Active Directory) of the group you wish to match.
204
+
1. In the User Group field, select the cloudtamer.io internal group you wish to map to the group in the Regex field.
205
+
1. Place a checkmark in **Update on Login**.
206
+
1. Select **Add** to add the group association.
178
207
179
208
## Next steps
180
209
181
-
Once you configure cloudtamer.io you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Cloud App Security](/cloud-app-security/proxy-deployment-any-app).
210
+
Once you configure cloudtamer.io you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Cloud App Security](/cloud-app-security/proxy-deployment-any-app).
0 commit comments