Configuring SSO with Azure Active Directory (AD)
In this article, you'll learn how to configure single sign-on (SSO) for your KnowBe4 account with Azure Active Directory (AD). When you configure SSO, you'll be able to assign users to KnowBe4 in Azure AD. Then, the users will be able to log in to their KnowBe4 Learner Experience (LX) by using Azure AD.
See the sections below to learn how to configure SSO for KnowBe4 with Azure AD.
Jump to:
Add the KnowBe4 Application to Azure AD
Assign Users to KnowBe4 in Azure AD
Configure Azure AD in Your KnowBe4 Account
Create New Certificate and Update Thumbprint
Add the KnowBe4 Application to Azure AD
To start configuring SSO with Azure AD, you'll need to add the KnowBe4 application to your Azure AD account.
To add the KnowBe4 application to your Azure AD account, follow the steps below:
- Log in to your Azure AD admin account.
- From the navigation panel, navigate to Enterprise applications > All applications.
- In the top-left corner of the page, click the + New application button.
- In the Add from the gallery field, enter "KnowBe4."
- Select the KnowBe4 Security Awareness Training application.
- In the window that opens, enter your preferred name for the app.
- Click the Add button at the bottom of the window.
- In the navigation panel, select the Single sign-on tab.
- Select the SAML method.
Next, obtain your unique KnowBe4 SSO Sign in URL. You'll need this information to configure SSO in Azure AD.
To obtain your SSO Sign in URL, follow the steps below:
- In a new window or tab, log in to your KnowBe4 account.
- In the top-right corner of the page, click your email address.
- Select Account Settings.
- Navigate to Account Integrations > SAML.
- Locate your unique SSO Callback (ACS) URL and SSO Sign in URL. In step 17, you'll need to copy and paste this information into Azure AD.
Finally, finish configuring SSO in Azure AD by following the steps below:
- Return to the Azure AD portal.
- In the Basic SAML Configuration section, click the pencil icon.
- Edit the fields on this page. For more information about the mandatory fields, see the screenshot and information below:
- In the Identifier field, enter the Entity ID "KnowBe4" or the Entity ID you generated in your Account Settings.
Note: KnowBe4 is case-sensitive.
- In the Reply URL text field, enter the unique SSO Callback (ACS) URL you obtained in step 14 above. For example, enter "https://training.knowbe4.com/auth/saml/xxxxxxxxxxxx/callback".
- In the Sign on URL text field, enter the unique SSO Sign in URL you obtained in step 14 above. For example, enter "https://training.knowbe4.com/auth/saml/xxxxxxxxxxxx".
Note: You only need to fill out the other fields on the Basic SAML Configuration page of your Azure AD portal in specific circumstances. For example, if you're using multi-factor authentication (MFA) for Azure AD, you'll need to add your callback link to the Relay State field. - In the Identifier field, enter the Entity ID "KnowBe4" or the Entity ID you generated in your Account Settings.
- After you fill out the fields on this page, click the Save button.
- In the User Attributes & Claims section, click the pencil icon to edit the attributes.
- Delete the attributes listed below:
- givenname
- surname
- emailaddress
- name
- Click the pencil icon to edit the Unique User Identifier attribute.
- In the Source attribute field, make sure the attribute is user.userprincipalname. If you would like for your user to be logged in with their email address instead, you can alternatively update this attribute to user.mail.
Note: If you're using SCIM for Azure AD, this attribute should the same as the SCIM Source attribute. By default, the SCIM Source attribute is user.userprincipalname. For more information, see the Advanced Configuration Options section of our How to Configure SCIM for Azure article. - Click the Save button.
- In the SAML Signing Certificate section, copy the Thumbprint.
- In the Set up section, copy the Login URL. You'll need this in addition to the Thumbprint above.
Note: You'll need to paste the Thumbprint and Login URL in the IdP SSO Target URL and IdP Cert Fingerprint fields when you set up SSO in your KnowBe4 account.
Assign Users to KnowBe4 in Azure AD
After you add the KnowBe4 application to Azure AD, you can assign users and groups to the application.
To assign users and groups to your KnowBe4 application, follow the steps below:
- Log in to your Azure AD admin account.
- Navigate to Enterprise applications > All applications.
- Select the KnowBe4 application.
- From the navigation panel, select the Users and groups tab.
- Click the + Add user button.
- Select the users or groups that you would like to assign to your KnowBe4 application.
- Click the Select button.
- Once you've added all the users or groups you would like to add, click the Assign button.
Configure Azure AD in Your KnowBe4 Account
To complete the configuration, you'll need to enter your Azure AD Login URL and Thumbprint into your KnowBe4 Account Settings.
To learn how to enter this information into your Account Settings, see our How to Set Up SAML Single Sign-on for the Security Awareness Training Platform article.
Create a New Certificate and Update Thumbprint
Each time your Azure AD SAML certificate expires, you'll need to create and activate a new certificate. Then, you'll need to update the SAML thumbprint in your KnowBe4 account.
To create a new certificate and update your thumbprint, follow the steps below:
- Log in to your Azure AD admin account.
- Navigate to Enterprise applications > All applications.
- Select the KnowBe4 application.
- From the navigation panel, select the Single sign-on tab.
- In the SAML Signing Certificate section of the page, click the pencil icon.
- Click the + New Certificate button.
- Select the calendar icon.
- Select the date that you would like your certificate to expire on.
- Click the Save button.
- Click the three dots icon next to the certificate you've created.
- Click the Make certificate active button.
- In the Thumbprint column, copy your new thumbprint. In step 17, you'll need to paste this thumbprint into your KnowBe4 account.
Next, you'll need to update your thumbprint in your KnowBe4 account by following the steps below:
- Log in to your KnowBe4 account.
- In the top-right corner of the page, click your email address.
- Select Account Settings.
- Navigate to Account Integrations > SAML.
- Paste your new certificate thumbprint into the IdP Cert Fingerprint field.
- Scroll down to the bottom of the page.
- Click the Save Changes button.
Note: Make sure the email address that your users use to authenticate with SAML is either entered into the Email or Email Aliases field of their User Profile. However, only the email address listed in the Email field will receive training notification emails. For more information about adding information to user profiles, see our User Profile Guide.
Comments
0 comments
Article is closed for comments.