Connect cyberelements to Azure AD
cyberelements offers an Azure AD connection functionality that allows you to seemlessly synchronize your Azure AD to the platform. Setting up an SAML domain is done in collaboration with our team.
In section we are going through all steps needed to get the synchronizing up and runing.
What you’ll need to get started:
- Certificate Base 64
- Azure ID Identifier
- Federation Metadata XML
When these elements are received by our team, we will provide a connection URL to your AD and the following information to be set up in your application:
- Identifier ID
- Reply URL
- Logout URL
In AzureAD, we now need to configure cyberelements
First, start by declaring the cyberelements application in AzureAD and activate an SAML authentication for it.
In the “single sign-on” menu, enter the information related to cyberelements:
Reply URL (Assertion Consumer Service URL):
Sign on URL:
Next, add the user groups that can connect to the application and define the user attributes used by Azure AD to connect to the application:
– In “Users and Groups”, manually add the groups that will be able to connect to the application.
– In “Single Sign On”, go to “User Attributes & Claims”.
– Add the groups attribute
> Check “Groups assigned to the application”.
> In “Source attribute”, select “Group ID”.
> Check “Customize the name of the group claim” then enter “groups” in the “Name (required)” field.
– Proceed with the AzureAD synchronisation.
Now add the SAML in the cyberelements console:
– No need to enter a Microsoft domain
– Maximum number of connections: must be the same as the contract
– Identity Provider: it looks like this: https://sts.windows.net/GUID
– Group name variable: saml-groups
– Login variable: saml-name
– Identity Provider : Azure
Try the Azure AD feature in cyberelements
or book a meeting with our experts
How To? Use the Remote Desktop Manager (RDM) application This article describes how to directly use the Remote Desktop Manager (RDM) application installed locally on
How To? Set up direct access to an RDS machine without an agent This article describes how to set up a direct access to a