Tutorial: Azure Active Directory single sign-on (SSO) integration with SignalFx
In this tutorial, you will learn how to integrate SignalFx with Azure Active Directory (Azure AD). When you integrate SignalFx with Azure AD, you can:
- Control from Azure AD who has access to SignalFx.
- Enable your users to be automatically signed-in to SignalFx with their Azure AD accounts.
- Manage your accounts in one location (the Azure portal).
Prerequisites
To get started, you need the following items:
- An Azure AD subscription. If you don't have a subscription, you can get a free account.
- SignalFx single sign-on (SSO) enabled subscription.
Scenario description
In this tutorial, you will configure and test Azure AD SSO in a test environment.
- SignalFx supports IDP initiated SSO.
- SignalFx supports Just In Time user provisioning.
Step 1: Add the SignalFx application in Azure
Use these instructions to add the SignalFx application to your list of managed SaaS apps.
- Log into the Azure portal.
- On the left-side navigation window, select Azure Active Directory.
- Select Enterprise applications, and then select All applications.
- Select New application.
- In the Add from the gallery section, in the search box, enter and select SignalFx.
- You may need to wait a few minutes for the application to be added to your tenant.
- Leave the Azure portal open, and then open a new web tab.
Step 2: Begin SignalFx SSO configuration
Use these instructions to begin the configuration process for the SignalFx SSO.
- In the newly opened tab, access and log into the SignalFx UI.
- In the top menu, click Integrations.
- In the search field, enter and select Azure Active Directory.
- Click Create New Integration.
- In Name, enter an easily recognizable name that your users will understand.
- Mark Show on login page.
- This feature will display a customized button in the login page that your users can click on.
- The information you entered in Name will appear on the button. As a result, enter a Name that your users will recognize.
- This option will only function if you use a custom subdomain for the SignalFx application, such as yourcompanyname.signalfx.com. To obtain a custom subdomain, contact SignalFx support.
- Copy the Integration ID. You will need this information in a later step.
- Leave the SignalFx UI open.
Step 3: Configure Azure AD SSO
Use these instructions to enable Azure AD SSO in the Azure portal.
Return to the Azure portal, and on the SignalFx application integration page, locate the Manage section, and then select Single sign-on.
On the Select a single sign-on method page, select SAML.
On the Set up single sign-on with SAML page, click the pencil icon for Basic SAML Configuration to edit the settings.

On the Set up single sign-on with SAML page, perform the following steps:
a. In Identifier, enter the following URL
https://api.<realm>.signalfx.com/v1/saml/metadataand replace<realm>with your SignalFx realm.b. In Reply URL, enter the following URL
https://api.<realm>.signalfx.com/v1/saml/acs/<integration ID>and replace<realm>with your SignalFx realm, as well as<integration ID>with the Integration ID you copied earlier from the SignalFx UI.SignalFx application expects the SAML assertions in a specific format, which requires you to add custom attribute mappings to your SAML token attributes configuration.
Review and verify that the following claims map to the source attributes that are populated in the Active Directory.
Name Source Attribute User.FirstName user.givenname User.email user.mail PersonImmutableID user.userprincipalname User.LastName user.surname Note
This process requires that your Active Directory is configured with at least one verified custom domain, as well as has access to the email accounts in this domain. If you are unsure or need assistance with this configuration, please contact SignalFx support.
On the Set up single sign-on with SAML page, in the SAML Signing Certificate section, find Certificate (Base64), and then select Download. Download the certificate, and save it on your computer. Then, copy the App Federation Metadata Url value; you will need this information in a later step in the SignalFx UI.

On the Set up SignalFx section, copy the Azure AD Identifier value. You will need this information in a later step in the SignalFx UI.
Step 4: Create an Azure AD test user
In this section, you'll create a test user in the Azure portal called B.Simon.
- From the left pane in the Azure portal, select Azure Active Directory, select Users, and then select All users.
- Select New user at the top of the screen.
- In the User properties, follow these steps:
- In the Name field, enter
B.Simon. - In the User name field, enter the username@companydomain.extension. For example,
B.Simon@contoso.com. - Select the Show password check box, and then write down the value that's displayed in the Password box.
- Click Create.
- In the Name field, enter
Step 5: Assign the Azure AD test user
In this section, you'll enable B.Simon to use Azure single sign-on by granting access to SignalFx.
- In the Azure portal, select Enterprise Applications, and then select All applications.
- In the applications list, select SignalFx.
- In the app's overview page, find the Manage section and select Users and groups.
- Select Add user, then select Users and groups in the Add Assignment dialog.
- In the Users and groups dialog, select B.Simon from the Users list, then click the Select button at the bottom of the screen.
- If you are expecting a role to be assigned to the users, you can select it from the Select a role dropdown. If no role has been set up for this app, you see "Default Access" role selected.
- In the Add Assignment dialog, click the Assign button.
Step 6: Complete the SignalFx SSO configuration
- Open the previous tab, and return to the SignalFx UI to view the current Azure Active Directory integration page.
- Next to Certificate (Base64), click Upload File, and then locate the Base64 encoded certificate file that you previously downloaded from Azure portal.
- Next to Azure AD Identifier, paste the Azure AD Identifier value that you copied earlier from the Azure portal.
- Next to Federation Metadata URL, paste the App Federation Metadata Url value that you copied earlier from the Azure portal.
- Click Save.
Step 7: Test SSO
Review the following information regarding how to test SSO, as well as expectations for logging into SignalFx for the first time.
Test logins
To test the login, you should use a private / incognito window, or you can log out of the Azure portal. If not, cookies for the user who configured the application will interfere and prevent a successful login with the test user.
When a new test user logs in for the first time, Azure will force a password change. When this occurs, the SSO login process will not be completed; the test user will be directed to the Azure portal. To troubleshoot, the test user should change their password, and navigate to the SignalFx login page or to the MyApps and try again.
- When you click the SignalFx tile in the MyApps, you should be automatically logged into the SignalFx.
- For more information about the MyApps, see Introduction to the MyApps.
- When you click the SignalFx tile in the MyApps, you should be automatically logged into the SignalFx.
SignalFx application can be accessed from the MyApps or via a custom login page assigned to the organization. The test user should test the integration starting from either of these location.
- The test user can use the credentials created earlier in this process for b.simon@contoso.com.
First-time logins
When a user logs into SignalFx from the SAML SSO for the first time, the user will receive a SignalFx email with a link. The user must click the link for authentication purposes. This email validation will only take place for first-time users.
SignalFx supports Just In Time user creation, which means that if a user does not exist in SignalFx, then the user's account will be created upon first login attempt.
Next steps
Once you configure SignalFx you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access. Learn how to enforce session control with Microsoft Defender for Cloud Apps.
Povratne informacije
Pošalјite i prikažite povratne informacije za