Tutorial: Microsoft Entra single sign-on integration with AwareGo

In this tutorial, you'll learn how to integrate AwareGo with Microsoft Entra ID. When you integrate AwareGo with Microsoft Entra ID, you can:

  • Control in Microsoft Entra ID who has access to AwareGo.
  • Enable your users to be automatically signed in to AwareGo with their Microsoft Entra accounts.
  • Manage your accounts in one central location, the Azure portal.

Prerequisites

To get started, you need the following items:

  • A Microsoft Entra subscription. If you don't have a subscription, you can get a free account.
  • An AwareGo single sign-on (SSO)-enabled subscription.

Scenario description

In this tutorial, you configure and test Microsoft Entra SSO in a test environment. AwareGo supports a service provider (SP)-initiated SSO.

To configure the integration of AwareGo into Microsoft Entra ID, you need to add AwareGo from the gallery to your list of managed software as a service (SaaS) apps.

  1. Sign in to the Microsoft Entra admin center as at least a Cloud Application Administrator.
  2. Browse to Identity > Applications > Enterprise applications > New application.
  3. In the Add from the gallery section, type AwareGo in the search box.
  4. In the results pane, select AwareGo, and then add the app. In a few seconds, the app is added to your tenant.

Configure and test Microsoft Entra SSO for AwareGo

Configure and test Microsoft Entra SSO with AwareGo by using a test user called B.Simon. For SSO to work, you need to establish a link relationship between a Microsoft Entra user and the related user in AwareGo.

To configure and test Microsoft Entra SSO with AwareGo, do the following:

  1. Configure Microsoft Entra SSO to enable your users to use this feature.

    a. Create a Microsoft Entra test user to test Microsoft Entra single sign-on with user B.Simon.
    b. Assign the Microsoft Entra test user to enable user B.Simon to use Microsoft Entra single sign-on.

  2. Configure AwareGo SSO to configure the single sign-on settings on the application side.

    a. Create an AwareGo test user to have a counterpart of B.Simon in AwareGo that's linked to the Microsoft Entra representation of the user.
    b. Test SSO to verify that the configuration works.

Configure Microsoft Entra SSO

To enable Microsoft Entra SSO in the Azure portal, do the following:

  1. Sign in to the Microsoft Entra admin center as at least a Cloud Application Administrator.

  2. Browse to Identity > Applications > Enterprise applications > AwareGo application integration page, under Manage, select single sign-on.

  3. On the Select a single sign-on method page, select SAML.

  4. To edit the settings, on the Set up Single Sign-On with SAML pane, select the Edit button.

    Screenshot of the Edit button for Basic SAML Configuration.

  5. On the edit pane, under Basic SAML Configuration, do the following:

    a. In the Sign on URL box, enter either of the following URLs:

    • https://lms.awarego.com/auth/signin/
    • https://my.awarego.com/auth/signin/

    b. In the Identifier (Entity ID) box, enter a URL in the following format: https://<SUBDOMAIN>.awarego.com

    c. In the Reply URL box, enter a URL in the following format: https://<SUBDOMAIN>.awarego.com/auth/sso/callback

    Note

    The preceding values are not real. Update them with the actual identifier and reply URLs. To obtain the values, contact the AwareGo client support team. You can also refer to the examples in the Basic SAML Configuration section.

  6. On the Set up single sign-on with SAML page, in the SAML Signing Certificate section, next to Certificate (Base64), select Download to download the certificate and save it to your computer.

    Screenshot of the certificate "Download" link on the SAML Signing Certificate pane.

  7. In the Set up AwareGo section, copy one or more URLs, depending on your requirements.

    Screenshot of the "Set up AwareGo" pane for copying configuration URLs.

Create a Microsoft Entra test user

In this section, you create a test user called B.Simon.

  1. Sign in to the Microsoft Entra admin center as at least a User Administrator.
  2. Browse to Identity > Users > All users.
  3. Select New user > Create new user, at the top of the screen.
  4. In the User properties, follow these steps:
    1. In the Display name field, enter B.Simon.
    2. In the User principal name field, enter the username@companydomain.extension. For example, B.Simon@contoso.com.
    3. Select the Show password check box, and then write down the value that's displayed in the Password box.
    4. Select Review + create.
  5. Select Create.

Assign the Microsoft Entra test user

In this section, you enable user B.Simon to use Azure SSO by granting access to AwareGo.

  1. Browse to Identity > Applications > Enterprise applications.
  2. In the Applications list, select AwareGo.
  3. On the app overview page, in the Manage section, select Users and groups.
  4. Select Add user and then, on the Add Assignment pane, select Users and groups.
  5. On the Users and groups pane, in the Users list, select B.Simon, and then select the Select button.
  6. If you're expecting to assign a role to the users, you can select it in the Select a role drop-down list. If no role has been set up for this app, the Default Access role is selected.
  7. On the Add Assignment pane, select the Assign button.

Configure AwareGo SSO

To configure single sign-on on the AwareGo side, send the Certificate (Base64) certificate you downloaded earlier and the URLs you copied earlier to the AwareGo support team. The support team creates this setting to establish the SAML SSO connection properly on both sides.

Create an AwareGo test user

In this section, you create a user called Britta Simon in AwareGo. Work with the AwareGo support team to add the users in the AwareGo platform. You must create and activate the users before you can use single sign-on.

Test SSO

In this section, you can test your Microsoft Entra single sign-on configuration by doing any of the following:

  • In the Azure portal, select Test this application. This redirects you to the AwareGo sign-in page, where you can initiate the sign-in flow.

  • Go to the AwareGo sign-in page directly, and initiate the sign-in flow from there.

  • Go to Microsoft My Apps. When you select the AwareGo tile in My Apps, you're redirected to the AwareGo sign-in page. For more information, see Sign in and start apps from the My Apps portal.

Next steps

After you've configured AwareGo, you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access App Control. For more information, see Learn how to enforce session control with Microsoft Defender for Cloud Apps.