SUPPORT

Contact Support

OPEN A TICKET

Configuring Azure Active Directory Integration with SAML

Azure Active Directory (Azure AD) is a universal platform designed to protect and manage access to identities. The Azure AD service provides SSO access to apps and services from anywhere.

Using Security Assertion Markup Language (SAML), a user can use their managed account credentials to sign in to enterprise cloud applications via Single Sign-On (SSO). An Identity Provider (IdP) service provides administrators with a single place to manage all users and cloud applications. You don't have to manage individual user IDs and passwords tied to individual cloud applications for each of your users. An IdP service provides your users with a unified sign-on across all their enterprise cloud applications. Netsparker Enterprise supports the SAML methods, both IdP initiated and SP initiated.

You can also create a new user in Netsparker Enterprise with the Enable Auto Provisioning option.

You have to use IdP-initiated SSO if you want to utilize Auto Provisioning.

Single Sign-On Fields

This table lists and explains the Single Sign-On fields in the Azure Single Sign-On window.

Field

Description

Enable

Select this option to enable the single sign-on feature.

Enforce to authenticate only with single sign-on

Enable this option so only administrator users can authenticate without single sign-on. Users can only sign in to Netsparker Enterprise by using the email address that belongs to their employer.

IdP Identifier

This is the SAML identity provider’s Identifier value.

SAML 2.0 Service URL

This is the Consumer URL value (also called the SSO Endpoint or Recipient URL).

SAML 2.0 Endpoint

This is the URL from your IdP's SSO Endpoint field.

X.509 Certificate

This is the X.509 certificate value.

Enable Auto Provisioning

Enable this option so that an account will be automatically created for IdP registered users when they first access Netsparker Enterprise.

If you enable this option for user creation in Netsparker Enterprise, you must complete the FirstName, LastName, and Phone Number (optional) fields in the Attribute Statements on the IdP side.

This means a new team member can log in to Netsparker Enterprise with no user permissions, such as Start Scan. Admins can add permissions after this.

Require SAML assertions to be encrypted

Enable this option to prevent third parties from reading private data in transit from assertions.

There are two options:

  • Generate a new certificate for me: Netsparker generates a key pair. Netsparker will keep a private key to decrypt received SAML messages and provide you with a certificate so that you can upload it on the IdP side.
  • I have an existing certificate: You need to upload your certificate to Netsparker by importing a decryption certificate from your files.

Use Alternate Login Email

Enable to allow users to use alternative email for SSO.

After you enable this, you can enter an alternative email in the New Member window and while editing the user's details in the Team window.

How to Configure Azure Active Directory Single Sign-On Integration with SAML
  1. Log in to the Azure Portal and navigate to Azure Active Directory. The Overview window is displayed.

  1. Click Enterprise applications. The Enterprise applications window is displayed.
  1. Click New application. The Browse Azure AD Gallery window is displayed.

  1. Enter Netsparker Enterprise in the search bar, and Click Netsparker Enterprise from the results. The Netsparker Enterprise window is displayed.

  1. Click Create, and Azure will add the application and will open the Overview window.

  1. Click Set up single sign on, and then SAML. The SAML-based Sign-on window is displayed.
  2. Log in to Netsparker Enterprise, and from the main menu, click Settings, then Single Sign-On. The Single Sign-On window is displayed. Select Azure Active Directory from the drop-down list. Copy the URL from the SAML 2.0 Service URL field.
  3. In Azure Active Directory, paste this URL into the Reply URL field. 
  4. Click Save.

  1. In Azure Active Directory, copy the URL from the Azure AD Identifier field and paste this URL into the IdP Identifier field in Netsparker Enterprise.
  2. In Azure Active Directory, copy the URL from the Login URL field and paste this URL into the SAML 2.0 Endpoint field.

  1. In Azure Active Directory, download and copy the content of the X.509 Certificate field. (The certificate becomes available once you successfully save the Basic SAML Configuration as described in the 7th, 8th, and 9th steps.)

  1. In Netsparker Enterprise's Single Sign-On window, paste the URL into the X.509 Certificate field.
  2. Check Enable Auto Provisioning, Require SAML assertions to be encrypted, and Use Alternate Login Email as required.
  3. Click Save Changes.

For further information, see instructions available on Microsoft.

Netsparker

Highly accurate, fast & easy-to-use Web Application Security Scanner

GET A DEMO