Skip to content

Commit 33eb54d

Browse files
Update single-sign-on-sso.md (#27784)
# Checklist for submitter If some of the following don't apply, delete the relevant line. <!-- Note that API documentation changes are now addressed by the product design team. --> - [ ] Changes file added for user-visible changes in `changes/`, `orbit/changes/` or `ee/fleetd-chrome/changes`. See [Changes files](https://github.com/fleetdm/fleet/blob/main/docs/Contributing/Committing-Changes.md#changes-files) for more information. - [ ] Input data is properly validated, `SELECT *` is avoided, SQL injection is prevented (using placeholders for values in statements) - [ ] Added support on fleet's osquery simulator `cmd/osquery-perf` for new osquery data ingestion features. - [ ] If paths of existing endpoints are modified without backwards compatibility, checked the frontend/CLI for any necessary changes - [ ] If database migrations are included, checked table schema to confirm autoupdate - For database migrations: - [ ] Checked schema for all modified table for columns that will auto-update timestamps during migration. - [ ] Confirmed that updating the timestamps is acceptable, and will not cause unwanted side effects. - [ ] Ensured the correct collation is explicitly set for character columns (`COLLATE utf8mb4_unicode_ci`). - [ ] Added/updated automated tests - [ ] A detailed QA plan exists on the associated ticket (if it isn't there, work with the product group's QA engineer to add it) - [ ] Manual QA for all new/changed functionality - For Orbit and Fleet Desktop changes: - [ ] Make sure fleetd is compatible with the latest released version of Fleet (see [Must rule](https://github.com/fleetdm/fleet/blob/main/docs/Contributing/fleetd-development-and-release-strategy.md)). - [ ] Orbit runs on macOS, Linux and Windows. Check if the orbit feature/bugfix should only apply to one platform (`runtime.GOOS`). - [ ] Manual QA must be performed in the three main OSs, macOS, Windows and Linux. - [ ] Auto-update manual QA, from released version of component to new version (see [tools/tuf/test](../tools/tuf/test/README.md)). - [ ] For unreleased bug fixes in a release candidate, confirmed that the fix is not expected to adversely impact load test results or alerted the release DRI if additional load testing is needed. --------- Co-authored-by: Brock Walters <[email protected]>
1 parent 97c9b65 commit 33eb54d

3 files changed

+30
-0
lines changed

docs/Deploy/single-sign-on-sso.md

+30
Original file line numberDiff line numberDiff line change
@@ -62,6 +62,36 @@ Create a new SAML app in Google Workspace:
6262

6363
8. Enable SSO for a test user and try logging in. Note that Google sometimes takes a long time to propagate the SSO configuration, and it can help to try logging in to Fleet with an Incognito/Private window in the browser.
6464

65+
## Entra
66+
Create a new SAML app in Microsoft Entra Admin Center:
67+
1. From the left sidebar, navigate to **Applications > Enterprise Applications**.
68+
2. At the top of the page, click **+ New Application**.
69+
3. On the next page, click **+ Create your own application** and enter the following.
70+
- For **Input name**, enter `Fleet`.
71+
- For **What are you looking to do with your application?**, select `Integrate any other application you don't find in the gallery (Non-gallery)`.
72+
- Click **Create**.
73+
4. In your newly crated Fleet app, select **Single sign-on** from the menu on the left. Then, on the Single sign-on page, select **SAML**.
74+
5. Click the **Edit** button in the (1) Basic SAML Configuration Box.
75+
- For **Identifier (Entity ID)**, click **Add identifier** and enter `fleet`.
76+
- For **Reply URL (Assertion Consumer Service URL)**, enter `https://<your_fleet_url>/api/v1/fleet/sso/callback`. If you're configuring [end user authentication](https://fleetdm.com/docs/using-fleet/mdm-macos-setup-experience#end-user-authentication-and-eula), use `https://<your_fleet_url>/api/v1/fleet/mdm/sso/callback` instead.
77+
- Click **Save**.
78+
6. In the **(3) SAML Certificates** box, click the copy button in the **App Federation Metadata Url** field.
79+
![The new SAML app's details page in Enta Admin Center](../images/entra-sso-configuration-step-6.png)
80+
81+
On your Fleet server:
82+
1. Navigate to **Settings > Organization settings > Single sign-on options**.
83+
2. On the **Single sign-on options** page:
84+
- Check the box to **Enable single sign-on**.
85+
- For **Identity provider name**, enter `Entra`.
86+
- For **Entity ID**, enter `fleet`.
87+
- In the **Metadata URL** field, paste the URL that you copied from Entra in step 6 in the previous section.
88+
- Click **Save**.
89+
90+
![The configuration for the SSO connection in Fleet](../images/entra-sso-configuration-fleet-config.png)
91+
3. Enable SSO for a test user and try to log in with Entra.
92+
93+
94+
6595
## authentik
6696

6797
Fleet can be configured to use authentik as an identity provider. To continue, you will need to have an authentik instance hosted on an HTTPS domain, and an admin account.
Loading
1.75 MB
Loading

0 commit comments

Comments
 (0)