# Setting Up Microsoft Entra (Azure AD)

This document outlines the steps required to set up Microsoft Entra (formerly Azure AD) SSO integration with StepSecurity.

**You can follow this interactive demo to get started with setting up Microsoft Entra SSO:**

{% embed url="<https://app.storylane.io/share/3xkjvmgacifg>" %}

### Setup Instructions

#### Step 1: **Configure SAML Settings**

* On the StepSecurity App navigate to Admin Console → Security & Auth → Configure SSO → Microsoft Entra ID

<figure><img src="https://754495266-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FQJRZY4cfEeY3I7DXTOCp%2Fuploads%2FvUC9sEQ4dE5vM3sbSH1C%2FUc-2vy73rjuIiU6D0g41z.png?alt=media&#x26;token=c0bf719b-a715-4a02-8ff2-d15ac1d5f9da" alt=""><figcaption></figcaption></figure>

* Copy the values displayed here

#### Step 2: Create a New Enterprise Application

* Navigate to your Microsoft Entra Admin Portal.
* Create a new Enterprise Application.
* Name the application StepSecurity.

<figure><img src="https://754495266-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FQJRZY4cfEeY3I7DXTOCp%2Fuploads%2F3H8SOQjNNGEomObV8vbN%2FScreenshot%202025-04-07%20at%201.09.16%E2%80%AFAM.png?alt=media&#x26;token=18edc964-05bb-4fd5-b099-db1fc8d50a91" alt=""><figcaption></figcaption></figure>

#### Step 3: Configure Single Sign-On

* After creating the application, go to the Single Sign-On section.
* Select SAML as the SSO method.

<figure><img src="https://754495266-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FQJRZY4cfEeY3I7DXTOCp%2Fuploads%2FiQXJQClFi6p6XNOJTPbQ%2FScreenshot%202025-04-07%20at%201.10.42%E2%80%AFAM.png?alt=media&#x26;token=64c5252c-b3ed-463e-acd4-2551ec37b828" alt=""><figcaption></figcaption></figure>

#### Step 4: Provide SAML Configuration

* Paste the values you obtained from the StepSecurity App into the corresponding fields

<figure><img src="https://754495266-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FQJRZY4cfEeY3I7DXTOCp%2Fuploads%2FU91WFtFcC657wgJ5M7g6%2F1768813667528.png?alt=media&#x26;token=9c6811e6-98db-4127-99a6-aad98f611a0d" alt=""><figcaption></figcaption></figure>

#### Step 5: Add a Group Claim

We recommend creating dedicated Microsoft-Entra groups for StepSecurity, such as `StepSecurity-Administrators` and `StepSecurity-Auditors`. Follow the instructions below to set them up:

<details>

<summary><strong>How to Setup StepSecurity Microsoft Entra Groups</strong></summary>

1. Navigate to the Admin Console in your Microsoft Entra dashboard and select Groups

<figure><img src="https://754495266-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FQJRZY4cfEeY3I7DXTOCp%2Fuploads%2FNLELEoXrYKDz7PNvwPRI%2FMPBhEIIfRukw_7SeZD3JS.png?alt=media&#x26;token=c1fb4248-934c-4041-882b-8ab667aecc35" alt=""><figcaption></figcaption></figure>

2. Click "New group"

<figure><img src="https://754495266-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FQJRZY4cfEeY3I7DXTOCp%2Fuploads%2FTm4hyhj7PQGdc7g0GLub%2F1768813925115.png?alt=media&#x26;token=02cc5df6-aaaf-4dba-aed3-069aa4ce089a" alt=""><figcaption></figcaption></figure>

3. Give the group an appropriate name and description, add members, and assign an owner

<figure><img src="https://754495266-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FQJRZY4cfEeY3I7DXTOCp%2Fuploads%2Fq82J1Cg8MtzEugljZjD8%2F1768813945591.png?alt=media&#x26;token=c85a35e9-8448-44b4-af3c-ceb6883f1530" alt=""><figcaption></figcaption></figure>

4. Create two groups: one for **StepSecurity Administrators** and another for **StepSecurity Auditors**

<figure><img src="https://754495266-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FQJRZY4cfEeY3I7DXTOCp%2Fuploads%2F2SzkZIgyOG2bvAUuUyqN%2F123.png?alt=media&#x26;token=9dc35213-0e02-42cb-af78-ecc29c19faeb" alt=""><figcaption></figcaption></figure>

5. To add the groups you just created to the application, go to the "Users and groups"

<figure><img src="https://754495266-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FQJRZY4cfEeY3I7DXTOCp%2Fuploads%2FjI5rHNzpWfxdv5HnoNT4%2FST1.png?alt=media&#x26;token=1471cb8d-41cc-433f-a75f-b4123b3c35e0" alt=""><figcaption></figcaption></figure>

6. Click "Add user/group"

<figure><img src="https://754495266-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FQJRZY4cfEeY3I7DXTOCp%2Fuploads%2F1vtG7N8quSp8Ye8uJuwf%2FST2.png?alt=media&#x26;token=1d89403b-4580-4bfa-b773-0d98973767f1" alt=""><figcaption></figcaption></figure>

7. Select the two groups you just created and assign it to the application

<figure><img src="https://754495266-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FQJRZY4cfEeY3I7DXTOCp%2Fuploads%2Fzvvj2Z9AgJG7MSQypkq7%2FST3.png?alt=media&#x26;token=6319ec10-406d-4d69-abdf-a54d00cc8897" alt=""><figcaption></figcaption></figure>

</details>

Update Attributes & Claims to pass group information in the SAML assertion.

* Open Attributes & Claims → Add a group claim.

<figure><img src="https://754495266-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FQJRZY4cfEeY3I7DXTOCp%2Fuploads%2FDSU9j1NYLRvNjd7C9ul6%2FSt4.png?alt=media&#x26;token=3e871c29-b2ca-4549-a8a5-6e1c22d091e8" alt=""><figcaption></figcaption></figure>

* Under Which groups select "Groups assigned to the application"
* Set Source attribute to Cloud‑only group display names.

<figure><img src="https://754495266-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FQJRZY4cfEeY3I7DXTOCp%2Fuploads%2FBh9ZEBSNQrxTO4smRjH2%2F1768814150130.png?alt=media&#x26;token=57a756f8-58b0-41e8-adac-3ce06b3f6c08" alt=""><figcaption></figcaption></figure>

* Expand Advanced options and add a filter to restrict the group to names that start with **“StepSecurity-”**

<figure><img src="https://754495266-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FQJRZY4cfEeY3I7DXTOCp%2Fuploads%2FFH2EOYzuf5keWYDXinYw%2F111.png?alt=media&#x26;token=eabd041a-a9f6-4ed5-b53e-32df8018be12" alt=""><figcaption></figcaption></figure>

* Enable Customize the name of the group claim and set Name to `Groups`.
* Click Save

{% hint style="danger" %}
**You should only pass StepSecurity groups to the StepSecurity platform. If the app passes all group memberships, it may exceed the maximum request body size.**
{% endhint %}

* This enables StepSecurity’s SCIM-like functionality — for example, you can use Microsoft Entra groups and map them to roles in the StepSecurity dashboard for centralized access control.

#### Step 6: For Idp Initiated login(Optional)

* To get your RelayState value go to the StepSecurity App and navigate to Admin Console → Security & Auth → Configure SSO → Microsoft Entra ID → Step 4

<figure><img src="https://754495266-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FQJRZY4cfEeY3I7DXTOCp%2Fuploads%2Fc3atFHlLxSbFZJn76FEc%2FScreenshot%202025-11-12%20at%2015.33.16.png?alt=media&#x26;token=7c8f342b-0ede-42e1-b48b-15ee5f283c6e" alt=""><figcaption></figcaption></figure>

* In the Entra portal, paste that value into Relay State (Optional) under Basic SAML Configuration and Save.

<figure><img src="https://754495266-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FQJRZY4cfEeY3I7DXTOCp%2Fuploads%2FcmDsMkUXh5RiRwD19sA2%2FScreenshot%202025-09-03%20at%201.27.16%E2%80%AFPM.png?alt=media&#x26;token=3d82957d-e69a-4f38-9b2c-0ba22ecaed8c" alt=""><figcaption></figcaption></figure>

#### Step 7: Exchange metadata and (optionally) configure IdP‑initiated access

* Download the IdP metadata file from the Entra SAML configuration page. Upload the file to the StepSecurity app and provide your organization’s email domain. Then notify the StepSecurity team via Slack or email and wait for the StepSecurity Operations team to update your tenant.

<figure><img src="https://754495266-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FQJRZY4cfEeY3I7DXTOCp%2Fuploads%2FaURB4lonFWc5tBXPTLI3%2FScreenshot%202025-11-12%20at%2015.33.36.png?alt=media&#x26;token=cc7ad47b-fb60-4936-86b9-4ba540554743" alt=""><figcaption></figcaption></figure>

#### **Step 8: Confirm SSO Setup**

* On the StepSecurity → Security & Auth page, you can test your SSO integration.
* To verify that the SSO flow is working, follow these steps:
  * Authorize your email address for SSO access: Navigate to the Admin Console -> Members and click "Add Members".
  * Select SSO as the Authentication Type and add your email as an authorized member.
  * Log out of your current StepSecurity session.
  * Go to `https://app.stepsecurity.io/login` and log in using SSO.
  * Confirm that you can successfully access the dashboard.
* For additional confirmation, go to Admin Console → Security & Auth, then in Step 3 of the Microsoft Entra SSO configuration, click "Run SSO Test". Verify that all checks on the test page pass successfully

<figure><img src="https://754495266-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FQJRZY4cfEeY3I7DXTOCp%2Fuploads%2FtsVeWcbU7qZVQUF883lw%2FScreenshot%202026-01-19%20at%2019.30.26.png?alt=media&#x26;token=9b2a58ff-e1af-413e-84a9-a7b1478f7d6a" alt=""><figcaption></figcaption></figure>

#### **Step 9: Add Members**

{% hint style="info" %}
**Important:** If any changes are made to SSO group membership in Microsoft Entra (for example, adding or removing a user from a group), the affected user must log out and log back into StepSecurity for the updated group access and role mappings to take effect immediately otherwise it will be reflected once the sso session is renewed.
{% endhint %}

Every SSO identity must be explicitly authorized in the StepSecurity dashboard. You can do this in two different ways:

* Authorize Individual users
* Authorize groups

<figure><img src="https://754495266-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FQJRZY4cfEeY3I7DXTOCp%2Fuploads%2FXph20xwgeFk56Ls21gEg%2FScreenshot%202026-01-19%20at%2019.36.17.png?alt=media&#x26;token=b472b8f7-a71f-48cd-80e4-a541ff084e36" alt=""><figcaption></figcaption></figure>

**To authorize individual users:**

* The user must also be explicitly authorized to access the application, either by assigning the user directly to the app or by assigning a group the user belongs to

<figure><img src="https://754495266-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FQJRZY4cfEeY3I7DXTOCp%2Fuploads%2FTUpkRi300MMICPZ7Rx3E%2FScreenshot%202026-01-19%20at%2019.33.13.png?alt=media&#x26;token=7fff39cd-9d88-47e2-b047-3c3ed2c6f570" alt=""><figcaption></figcaption></figure>

* Once the user is authorized in Microsoft Entra in your StepSecurity dashboard navigate to Admin Console -> Members

  <figure><img src="https://754495266-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FQJRZY4cfEeY3I7DXTOCp%2Fuploads%2FGGXqrFtZvhBWQ00FXDMo%2FScreenshot%202025-12-01%20at%2013.11.34.png?alt=media&#x26;token=9b74a1ea-6549-4244-be12-aa5e30834315" alt=""><figcaption></figcaption></figure>

  * Click "Add Members" and select the SSO option
  * Add the user's email address

  <figure><img src="https://754495266-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FQJRZY4cfEeY3I7DXTOCp%2Fuploads%2FkTW91j3VEFQ5s9Sdo1ZC%2FScreenshot%202025-12-01%20at%2013.12.46.png?alt=media&#x26;token=a9584436-5d3f-4585-91d6-0faa051d2a74" alt=""><figcaption></figcaption></figure>

**To authorize groups:**

* Ensure that the group is authorized to use the application
* Once the group is authorized in Microsoft Entra in your StepSecurity dashboard navigate to Admin Console -> Members

<figure><img src="https://754495266-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FQJRZY4cfEeY3I7DXTOCp%2Fuploads%2Fl23vheDfLKK0txmWeF7L%2FScreenshot%202026-01-19%20at%2019.42.16.png?alt=media&#x26;token=ca7385c3-4799-4378-9d2d-8846c01df41e" alt=""><figcaption></figcaption></figure>

* Click "Add Members" on your StepSecurity dashboard and select the SSO Group option
* Add the SSO group

<figure><img src="https://754495266-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FQJRZY4cfEeY3I7DXTOCp%2Fuploads%2F6DiHJRUbEtcE7y2bLT7A%2FScreenshot%202025-12-01%20at%2013.23.53.png?alt=media&#x26;token=d8abb855-727b-4ad0-8647-4a9db0617f32" alt=""><figcaption></figcaption></figure>

For more details on adding members to your StepSecurity dashboard, visit this [documentation](https://docs.stepsecurity.io/admin-console/members).
