Prerequisites
Before you begin, you’ll need:- Administrative access to your Microsoft Entra ID tenant (Azure portal)
- The SSO configuration details from Ally Security (we’ll provide these after you request SSO setup)
- The email domain(s) that should be enabled for SSO
Step 1: Create a new enterprise application in Microsoft Entra ID
- Navigate to the Microsoft Entra admin center and sign in with your admin account.
- In the left navigation menu, expand Identity and select Applications > Enterprise applications.
- Select + New application at the top of the page.
- Select + Create your own application.
- Enter a name for the application (e.g., “Ally Security”) and select Integrate any other application you don’t find in the gallery (Non-gallery).
- Select Create to create the application.
Step 2: Configure SAML-based single sign-on
- After the application is created, you’ll be redirected to the application overview page.
- In the left navigation menu, select Single sign-on.
- Select SAML as the single sign-on method.
- In the Basic SAML Configuration section, select Edit.
-
Configure the following settings using the information provided by Ally Security:
Identifier (Entity ID)
- Enter the Entity ID provided by Ally Security
- Enter the ACS URL provided by Ally Security
- Select Save to save the configuration.
Step 3: Configure attribute mappings
Ally Security requires specific attributes in the SAML response. Configure the following attribute claims:- In the Attributes & Claims section, select Edit.
-
You may need to modify the existing claims or add new ones. Configure the following:
Email address (required)
- Select Add new claim or edit the existing email claim
- Name:
mail - Source attribute: Select
user.mailfrom the dropdown
- Select Add new claim
- Name:
firstName - Source attribute: Select
user.givennamefrom the dropdown
- Select Add new claim
- Name:
lastName - Source attribute: Select
user.surnamefrom the dropdown
- Select Save after configuring each claim.
[!NOTE] Ensure that the attribute names (firstName,lastName) are entered exactly as shown, as they are case-sensitive.
Step 4: Assign users or groups
Before users can sign in using SSO, you need to assign them to the enterprise application:- In the left navigation menu, select Users and groups.
- Select + Add user/group at the top.
- Under Users, select None Selected and search for the users or groups you want to assign.
- Select the users or groups, then select Select.
- Select Assign to complete the assignment.
[!TIP] Assigning a group is recommended for easier management. All members of the assigned group will be able to sign in via SSO.
Step 5: Download or copy the Federation Metadata
After completing the SAML configuration, you’ll need to provide Ally Security with your federation metadata:- Navigate back to the Single sign-on page for your application.
- In the SAML Certificates section, locate App Federation Metadata Url.
- Copy this URL to share with Ally Security.
- In the same SAML Certificates section, select Download next to Federation Metadata XML.
- Share this file with your Ally Security contact.
What to provide to Ally Security
To complete the SSO setup, please provide the following information:- Federation Metadata URL or Federation Metadata XML file: From the SAML Certificates section (as described in Step 5)
- Email domain: The email domain(s) that should be enabled for SSO (e.g.,
@yourcompany.com) - Test user email (optional): An email address of a test user that can be used to verify the SSO configuration
After setup is complete
Once Ally Security has configured SSO on our end:- All users with email addresses ending in your configured domain will be redirected to Microsoft Entra ID for authentication
- Users will sign in using their Microsoft credentials
- Existing users with matching email domains will need to use SSO to sign in
[!WARNING] If there are existing users with email domains that match the SSO configuration, they will be required to use SSO to sign in once it’s enabled. Make sure to communicate this change to your team members.
Troubleshooting
If you encounter issues during setup:- Verify attribute mappings: Ensure that the attribute names (
mail,firstName,lastName) match exactly as specified and are mapped to the correct source attributes - Check user assignments: Confirm that users or groups have been assigned to the enterprise application
- Verify domain configuration: Ensure the email domain matches what was provided to Ally Security
- Check SAML configuration: Verify that the Entity ID and Reply URL match exactly what was provided by Ally Security
- Review sign-in logs: In Microsoft Entra ID, navigate to Identity > Monitoring & health > Sign-in logs to review any authentication errors
- Contact support: Reach out to Ally Security support if you need assistance with the configuration
