Microsoft Entra SSO setup guide
This guide will walk you through the setup of ComplyCloud’s SSO solution.
If you have questions or would like to schedule a support meeting, please do so by emailing us at support@complycloud.com.
- Authentication through SAML, handling the login of your Microsoft users in ComplyCloud.
- Provisioning through SCIM, handling the synchronization of users and roles between your Entra and our application.
ComplyCloud Integration Page
During the setup steps later in the guide you will be asked to provide URLs and secrets that are specific to your ComplyCloud account. You can find the needed information in your ComplyCloud account (Settings > Account Management >Integrations), as shown in the screenshot below, from here on referred to as the ComplyCloud integration page.
Setup
- Setup the Enterprise application
- Go to your Entra Admin Center
- Navigate to “Enterprise applications”
- Press “New Application”
- Click “Create your own application” and in the pop-out on the right, name the application (eg. ComplyCloud SSO) and select “Integrate any other application…”
- Click “Create”
- Setup application roles
- Navigate to “App registrations”
- Find the app registration of the enterprise app you created in step 1 and click it.
- In the left sidepanel, select “App Roles”. At this point, the App roles list should be empty, but if there are app roles here that you want to delete, click the row, untick the “Do you want to enable this role” checkbox and press “Apply”. The Role can now be deleted.
- In the left sidepanel, click “Manifest”
- On the integrations page in ComplyCloud, click the “Download App roles” button and insert the downloaded list of roles under “appRoles” in the shown manifest. Only copy from opening square bracket([), to closing square bracket (]).
- Click the “Save” button.
- Generate SAML
- Navigate to “Enterprise applications” and select the app you created in step 1.
- In the left sidepanel, click “Single sign-on” and select the “SAML” box under “Select a sign-on method”.
- Click “Edit” under “Basic SAML Configuration”.
- Click “Add Identifier” add the “Entity id” value found on the ComplyCloud Integration page.
- Click “Add Reply URL” add the “Redirect URL” value found on the ComplyCloud Integration page.
- Click “Save”
- Upload SAML
- Still on the SAML page, under “SAML Signing Certificate” click “Download” where it says “Federation Metadata XML”.
- On the ComplyCloud Integration page, click the “Upload SAML” button and upload the file downloaded in step 4a.
- Still on the SAML page, under “SAML Signing Certificate” click “Download” where it says “Federation Metadata XML”.
- Add users and assign roles
- Still on the Enterprise application page of created app, go to “Users and Groups” click “Add user/group”.
- Select the user you would like to grant access and the role you would like to assign for that user.
- Click the “Assign” button.
-
Add groups (this step is optional). NOTE: Groups in Microsoft Entra ID are used to create “Departments” in ComplyCloud.
-
Go to “Users and Groups” again, click “Add user/group”.
-
Select the groups you would like to add to your Enterprise application and select the “User – YourCompanyName” role for it. It’s important to give the group the lowest role possible, otherwise it will overwrite the users’ roles.
-
Click the “Assign” button.
-
- Setup provisioning
- Still on the Enterprise application page of created app, go to “Provisioning”.
- Click “Get started” and then choose the “Automatic” “Provisioning mode”.
- Under “Admin Credentials” set the “Tenant URL” to the “Provision URL” found on the ComplyCloud integration page.
- Under that, set the “Secret Token” to the “Provision Secret” found on the ComplyCloud integration page.
- Test that the configuration is correct, by clicking the “Test Connection” button.
- Click the “Provision Microsoft Entra ID Users” under "Mappings"
- Tick the “Show advanced options” at the bottom of the page and click the “Edit attribute list for customappsso”
- Tick the “Required” checkbox of the row called “emails[type eq “work”].value”
- Add a row at the bottom named “roles” with “Type” set to “String” and tick the “Required” and “Multi-value”.
- Back on the “Attribute Mapping” page click “Add New Mapping” and set the following values:
- Mapping Type – Expression
- Expression – AppRoleAssignmentsComplex([appRoleAssignments])
- Target attribute – roles
- Configure your attribute mapping so that it looks like the screenshot below:
customappsso Attribute Microsoft Entra ID Attribute userName userPrincipalName active Switch([IsSoftDeleted],,"False","True","True","False") displayName displayName emails[type eq "work"].value userPrincipalName preferredLanguage preferredLanguage roles AppRoleAssignmentsComplex([appRoleAssignments]) -
Click “Ok” and click “Save” on the “Attribute Mapping” page.
- Enabling the provisioning
- Still on the Enterprise application page of created app, go to “Provisioning”.
- Click the “Start provisioning” button to have Entra start provisioning your configured users with roles, as you set up in step 5.
- If you want to run a more controlled test, click the “Provision on demand” button to force the provisioning of a specific user. Follow the on-screen instructions to check that everything works.
You are done! Provisioned users should now be directed to Microsoft to log in when they attempt to log in to ComplyCloud. Please contact us at support@complycloud.com if you experience any issues following this guide or check the troubleshooting guide here: <LINK>.