Azure AD (Active Directory)

Learn to configure Azure AD SSO with BigPanda.

Azure AD (Active Directory) Sign-On automatically signs users in when they are on their corporate devices connected to your corporate network. When enabled, users don't need to type in their passwords to sign in to Azure AD, and usually, even type in their usernames. This feature provides your users easy access to BigPanda without needing any additional on-premises components.

Use the instructions on this page to configure the Azure AD solution in BigPanda.

For information about key features and requirements for BigPanda SSO integrations, see Single Sign-On.

Before You Start

To integrate Azure Active Directory with BigPanda, you need:

  • An Azure AD subscription and user account. If you don't already have a subscription or an account, you can Create a free user account.
  • One of the following roles in Azure AD: Global Administrator, Cloud Application Administrator, Application Administrator, or owner of the service principal.
  • A BigPanda account with the Single Sign On role set to Full Access. See Roles and Resource Permissions for more information.

Add the BigPanda Application in Azure AD

Before you begin configuring single sign-on, you need to add the BigPanda application from the Azure AD gallery. A test user account can be used to assign to the application and test the single sign-on configuration.

For more information on how to add an application from the gallery, see the Quickstart: Add application from the gallery.

Create and Assign an AD Test User

Follow the guidelines in the create and assign a user account article to create a test user account in the Azure portal. The same account must also be created in BigPanda to test signing in. See User Management for more information on account creation in BigPanda.

Configure Azure AD SSO

Complete the following steps to enable Azure AD single sign-on in the Azure portal.

  1. In the Azure portal, on the BigPanda application integration page, find the Manage section and select single sign-on.
  2. On the Select a single sign-on method page, select SAML.
  3. On the Set up single sign-on with SAML page, select the pencil icon for Basic SAML Configuration to edit the settings.
Edit Basic SAML Configuration

Edit Basic SAML Configuration

  1. In the Basic SAML Configuration section, populate the following fields:
    • In the Identifier textbox, paste the URL: https://bigpanda.io/SAML2
    • In the Reply URL textbox, paste a URL using the following pattern: https://api.bigpanda.io/login/<YOUR_ORG_NAME>/azure/callback
  2. On the Set up single sign-on with SAML page, in the SAML Signing Certificate section, find Federation Metadata XML and select Download to save the file.
Azure AD Federation Metadata

Azure AD Federation Metadata

  1. In the Set up BigPanda section, copy the Login URL.
Azure AD Application Links

Azure AD Application Links

Add Azure AD to BigPanda

After adding BigPanda in the Azure AD Gallery, you can then set up SSO with Azure AD in BigPanda Settings.

  1. Within BigPanda, navigate to Settings > Single Sign-On.
  2. Select the Azure AD icon.
  3. Under Configure Azure AD Information in BigPanda, populate the following fields with the information copied from Azure:
    • Identifier (Entity ID) - Paste https://bigpanda.io/SAML2 into the box.
    • Login URL - The login URL copied from Azure AD.
    • SAML Certificate - The SAML certificate, copied from the Federation Metadata XML file downloaded from Azure. The certificate is between the <X509Certificate> tags in the file. Paste the certificate without the BEGIN CERTIFICATE and END CERTIFICATE lines, and without whitespaces.
  4. Click Configure Azure AD to save.

Validate the Azure AD Integration

Before enabling the Azure AD integration for your entire organization, test it with your own account.

  1. Click Logout and Validate.
  2. In Azure AD, ensure the test user has been assigned to BigPanda in the User and Groups section.
  3. Log in to BigPanda with Azure AD SSO. Be sure to leave the BigPanda password field blank.
  4. If your login was successful, return to the Azure AD SSO configuration page and click Activate SSO to enable SSO for your entire organization.

🚧

Until you enable the Azure AD integration for the entire organization, all users can log in to BigPanda with their original credentials. Once enabled, they will be required to use the Azure AD authentication.

JIT Provisioning with Azure AD

After configuring the Azure AD SSO integration, you can also enable JIT provisioning. SSO with Just-In-Time (JIT) Provisioning automatically creates user accounts in BigPanda when users first log in via SSO, eliminating the need for manual account creation. Account creation is based on rules and properties defined in your SSO provider’s object.

See the SSO Configuration page for setup steps. Follow the instructions below to set up firstName and lastName claims for JIT provisioning.

Set firstName and lastName claims in Azure AD for JIT Provisioning

Azure does not provide firstName and lastName claims by default. BigPanda uses these claims to set the name field for users created via JIT provisioning. To correctly map first names and last names using Azure, you'll need to add a custom claim for each attribute:

  1. In Azure, navigate to Attributes & Claims and select Add new claim to open the Manage user claims page.
  2. In the Name field, enter the name of the claim. You will need to add a firstName claim and a lastName claim separately.
  3. In the Source field, select Attribute.
  4. In the Source attribute field, enter the source where the claim is going to retrieve its value. For firstName, enter user.givenname and for lastName, enter user.surname.
  5. Click Save.
Azure AD Manage Claims

Azure AD Manage Claims