š¤ Who can do this? You will need to be an admin user within Atlan to configure SSO. You will also need to work with your Azure AD administrator to carry out the tasks below in Azure AD.
šØ Careful! SSO group mappings are triggered every time a user authenticates in Atlan. A user may need to log out and then log into Atlan again to view the changes. If a user is added to a new group or removed from an existing one in Azure AD, the updates will also be reflected in Atlan. To ensure that the sync is successful, the groups that the user belongs to should be mapped in Atlan, and if a group name has changed in Azure AD, you will need to update the group name in Atlan as well. For any questions about group mapping sync, head over here.
To integrate Azure AD SSO for Atlan, complete the following steps.
Choose SSO provider (in Atlan)
To choose Azure AD as your SSO provider, within Atlan:
- From the left menu on any screen, navigate toĀ Admin.
- Under theĀ Workspace heading, clickĀ SSO.
- UnderĀ Choose SAML provider, selectĀ Azure AD and then clickĀ Configure.
- UnderĀ Service provider metadata, copy theĀ Identifier (Entity ID), Reply URL (Assert Consumer Service URL), and Logout Url.
Set up SAML app (in Azure AD)
To set up a SAML app, within Azure's portal:
- From the menu on the left, open Azure Active Directory.
- UnderĀ Azure Active Directory | Overview click theĀ Add button and thenĀ Enterprise application.
- UnderĀ Browser Azure AD Gallery click theĀ Create your own application button:
- ForĀ What's the name of your app? enter a name, such asĀ Atlan.
- ForĀ What are you looking to do with your application? selectĀ Integrate any other application you don't find in the gallery (Non-gallery).
- At the bottom of theĀ Create your own application dialog, click the Create button.
- Wait for the application details to be shown ā this can take around 1 minute.
- UnderĀ Getting Started and within the Set up single sign on tile, click the Get started link.
- UnderĀ Select a single sign-on method click theĀ SAML tile.
- In the upper-right of the Basic SAML Configuration card, click the Edit button and enter:
- ForĀ Identifier (Entity ID) click Add identifier and enter the value you copied from Atlan above.
- ForĀ Reply URL (Assertion Consumer Service URL) click Add reply URL (twice) and enter the two values you copied from Atlan above. The longer URL should be enabled under the Default column.
- ForĀ Logout Url (Optional) enter the value you copied from Atlan above.
- At the top of the page, underĀ Basic SAML Configuration, click theĀ Save button.
- Close theĀ Basic SAML Configuration dialog by clicking X in the upper-right.
- In the upper-right of the Attributes & Claims card, click the Edit button:
- Navigate to the Additional claims section, click each of the following claims to modify their Name exactly as suggested below and remove the Namespace value:
- email ā> user.mail
- firstName ā> user.givenname
- lastName ā> user.surname
- (Optional) username ā> ExtractMailPrefix(user.mail)
šŖ Did you know? For users assigned to Atlan through SSO, the username will be populated from the username mapping. Otherwise, the username will be the email prefix by default, which users can update while registering on Atlan for the first time.
- To configure group claims:Ā
- From the options along the top, click + Add a group claim.
- In the popover, under Which groups associated with the user should be returned in the claim?, select Groups assigned to the application.
- From the Source attribute dropdown, select Cloud-only group display names (Preview). If you have a hybrid setup, select sAMAccountName instead and then check the Emit group name for cloud-only groups checkbox.
šØ Careful! Please ensure that the
Cloud-only group display names
attribute contains the actual group display names. If not, you will need to update the source attribute with the relevant one that contains group display names. - Click Advanced options to expand the dropdown menu:
- Check the Customize the name of the group claim box.
- For Name, enter
memberOf
. This is required if you want to retain group membership in Atlan.
- Click Save and close the popover by clickingĀ X in the upper-right.
- Navigate to the Additional claims section, click each of the following claims to modify their Name exactly as suggested below and remove the Namespace value:
Download Azure AD's metadata file (in Azure AD)
To download Azure AD's metadata file, within the same Azure AD app's SAML-based Sign-on page:
- Within theĀ SAML Signing Certificate card, to the right ofĀ Federation Metadata XML, click theĀ Download link.
- Within theĀ Set up <application> card, copy theĀ Logout URL.
Assign users or groups to the app (in Azure AD)
To assign users or groups to the app, within the Azure AD application's page:
- UnderĀ Manage, click Users and groups.
- At the top of the table, click theĀ Add user/group button.
- In the resulting Add Assignment dialog, under the Users or GroupsĀ heading, click the None Selected link.
- In the resulting Users or GroupsĀ dialog, search for users or groups to add and click to select them.
- When finished, at the bottom of theĀ Users or Groups dialog, click the Select button.
- At the bottom of theĀ Add Assignment dialog, click theĀ Assign button.
Upload Azure AD's metadata file (in Atlan)
To complete the configuration of Azure AD SSO, within Atlan:
- From the left menu on any screen, navigate toĀ Admin.
- Under theĀ Workspace heading, clickĀ SSO.
- UnderĀ Choose SAML provider, selectĀ Azure AD and then clickĀ Configure.
- To the right ofĀ Identity provider metadata click the Import from XML button.
- Select the XML file downloaded from Azure AD above.
- UnderĀ Single Logout Service URL, enter the logout URL copied from Azure AD above.
- At the bottom of the screen, clickĀ Save.
Congratulations ā you have successfully set up Azure AD SSO in Atlan! š
šŖ Did you know? By default, users can now log into Atlan with either Azure AD SSO or a local Atlan account (via email). To only allow logins via SSO, enable the Enforce SSO option in Atlan. Once SSO is enforced, we recommend asking your Azure AD administrator to provision access to users through the Azure portal and not directly from Atlan. When access has been provided, a user will be able to log into Atlan directly and their profile will be generated automatically.
(Optional) Configure group mappings
šØ Careful! Before you can configure group mapping, you will first need to create groups in Atlan that correspond to the groups you want to map from Azure AD to Atlan. In addition, you must configure the
memberOf
attribute and group mapping to retain group membership in Atlan ā irrespective of whether or not you enable SCIM.To automatically assign Azure AD users to Atlan groups based on their Azure AD groups, within Atlan:
- From the left menu on any screen, navigate toĀ Admin.
- Under theĀ Workspace heading, clickĀ SSO.
- Change to the Groups Mapping tab.
- To the right of each Atlan group listed:
- Under the SSO Groups column, type the name of the corresponding group in Azure AD to map to the Atlan group on that row ā for example,
Data Engineering
,Business Analysts
, and so on. You will need to provide each Azure AD group with access to Atlan. - Click theĀ Save button on that row.
- Under the SSO Groups column, type the name of the corresponding group in Azure AD to map to the Atlan group on that row ā for example,
As each user signs up to Atlan, they will be automatically assigned groups in Atlan based on these mappings! š
šŖ Did you know? You can configure SCIM provisioning in Azure AD to manage your users and groups in Atlan. Plus, once you've configured group mapping, you can add the mapped groups to a persona or purpose to auto-assign relevant permissions to users as they sign up in Atlan.