Skip to main content

AD_4nXfowsfwbtVZO_3_Qb30bVEWyIRENaIKgVd31sWd3kOLSKuPrZNdklhK0BUlV_Gb0RIWpucqUmX1J71X6C_KDO-5FdFhxfU37ZHnUKXHlmv9nAExyceTx6jb1tsKrlI2CTD84L5ORE-HP7BVW6wzXifDg2s?key=CWdTQ90arHQUB8rnd9b5GQ

Netskope Global Technical Success (GTS)

Netskope Admin SSO - Microsoft Azure


 

Objective

This document provides step-by-step instructions to help our customers configure SSO with Azure for Netskope Admin accounts.

 

Details
When configuring Single Sign-On for the admins to access the Netskope tenant below are the prerequisites:

  • Local Login admin access to Netskope tenant
  • Admin access to Azure “Microsoft Entra ID”

Step-by-Step configuration

Step1: Login into the Netskope Tenant using the “Local Login” Credentials shared with the admin when the tenant was created.
 

Link: https://<NetskopeTenant>.goskope.com/locallogin

AD_4nXcZXda9dbtMP5yNuDqaTmfm5s1CK0DMYP_94ATPVhNM8frsY19GUIgverqtiog9vuoSHJPojA_FMJHGI1gMIu--Tx_dkPv0LdXVqtu3oyzANhi3Gujsz5JVAd46V4-sBfXcYOdilrPSIvdAZ1Agxk8EmFab?key=CWdTQ90arHQUB8rnd9b5GQ

 

Step2

Path: Netskope Tenant UI >>> Settings >>> Administration >>> SSO 

AD_4nXfp_wJY9v0vejdDLA4psP9sdvwDsvvilX5wBxXIzvdDFE22t2IsxAKgJJY_XxB5cnbbeuA5uwkZFL1X5Yr0ScY8LPe2b0W6yIl4NqiMgQVrLkELrt6fmKaD5LBmsxJ5snNrHqMMimclr-53pKHAH5TJ9mE?key=CWdTQ90arHQUB8rnd9b5GQ


 

Step3: Click on “New Account” on SSO Page to configure the Single Sign-On setup for Azure.

Once clicked we will see a 3 page prompt:

  1. Account Info
  2. Netskope Settings
  3. Create Account

Account Info

AD_4nXdMmwEE9ICZUjiwffmJLO2YbC6GUq7gQiC7Ybzds7GtZScu7nB7IWsBg3txslDh3IriUSziu35AkE4q0i3y9yVXkuULb9YKkkCRsVNYL9FVASQbn3rBFPmDCI9zuGsgxBQAjwckPgYoinnI1ImkgwB2T2Du?key=CWdTQ90arHQUB8rnd9b5GQ

We can start the configuration by assigning a Name to the account (eg: Azure Admin SSO).

User Authentication Domain is an important field - which will decide which IDP to select looking at the domain in case of multiple IDPs being used. (Multiple IDP access is not available by default).

Add/Manage existing or new domain

 

Path: Netskope Tenant UI >>> Settings >>> Administration >>> Internal-domains
AD_4nXeIPOrqP5a5t3RZ9tRkufRw9oQC__r8PPmqh9a6fTTaVIjihTQnlI199S5j9Xwn9FpWticWFejAbmOMXJ4x9r096cxDPPIb8BvhHUk7Sy_kIBNW1sGma_m3GuNpLDi8j1dbnLnVZ-qhpqoxHfn2FcoCZ8sv?key=CWdTQ90arHQUB8rnd9b5GQ

 

Alternate User ID Attribute - This is an optional field and can be used to provide alternative attributes. Currently Netskope User ID is an email address by default.

 

Netskope Settings

AD_4nXcMtasdgkLr3ajFAKkdMNh0BAt9JNbRnk3GZsT89fo8OLXZZ9UhwzXojaWZ5rN9maeXAamCMcMf3I3sPsBvRQmJKWRrSYdogXrb8WEcU5YQf5kZhuRcv0LQzWQeAKgVe0eJplmBP5bI0-U4VGJoILQLpLKa?key=CWdTQ90arHQUB8rnd9b5GQ

 

When setting up SAML (Security Assertion Markup Language) authentication, the ACS URL, Entity ID, and SAML certificate are required from the Service Provider (SP) to establish a secure and successful connection between the SP and the Identity Provider (IdP).

  1. The ACS URL is where the IdP sends the SAML assertion (authentication response) after a user successfully authenticates.
  2. The Entity ID is a unique identifier for the ISP. Distinguishes the SP from other providers, ensuring that the correct service is interacting with the IdP. 
  3. The SAML certificate is used to sign and encrypt the SAML assertions and responses, ensuring data integrity and confidentiality.

 

**We can also download the SP Metadata (XML file - Which Comprises all the information mentioned above). 

SP Metadata file can be later used to upload all the required information on Azure.

 

Admin roles – we can decide whether all admin roles should be directed to log in via SSO, or if only specific admin roles should use SSO for authentication.

 

Create Account

AD_4nXc7ILc09rWJH0UCQBufXm_6qhdPOrWahuHAR-_-UTtMsJI-KHEz7qrhJcTCwqLLCc9N91jmhUMfUvv_qFMubQmDSoV6dEsLS39mFpvPT97ugQ-Wec2F9cq-h8D8YO17HJARP1HvFHsn1kq2boG-zY6ifFEw?key=CWdTQ90arHQUB8rnd9b5GQ

 

Account Status needs to be Enabled in order for the SSO to work.

We can use extra layer of security by enabling - Sign SSO Authentication request
-  Which adds a digital signature to the Single Sign-On (SSO) authentication request, ensuring its integrity. When the request is signed, it confirms to the Identity Provider (IdP) that the request truly comes from the Service Provider (SP) and has not been altered in transit.

**This helps prevent unauthorized or tampered login attempts by verifying the legitimacy of the authentication request before allowing access.

Disable Force Authentication - by checking this box, Netskope will not send Force Authentication requests in the SAML Request. (Bypassing Auth. for admins)
By default, users will be required to login(Authenticate) to the application.

 

—----------------------- In order to fetch further (Required) information —-----------------------------

  • IDP SSO URL
  • IDP Entity ID
  • IDP Certificate

 

Step 4: Login to the Azure Account with admin privileges to configure the IDP side and fetch the required information.

Azure: https://portal.azure.com

Navigate: Home > Microsoft Entra ID > Enterprise Applications > Manage > All Applications

AD_4nXf4aT7piQXQe6xDih5BLTUet05EnW-IGqeAF2SYFm6BHpAJ9U4ygQVMwgHs9AWyt8jOpc4vQwB6DR1yqk4xPYCefGfbhRda3Uebs3eqBGGwYYNY5cc2fyhPiBTRh7WcAQVGMo3XbnVewxfQgJVOgA39NN6z?key=CWdTQ90arHQUB8rnd9b5GQ

 

Step5: Click on the “New Application” to add and configure “Netskope Administrator Console

AD_4nXeZxmlCnVqqriSWPXQ7HrhHzshR20MI_MSAdoNxOiBGY2XQyg6bl5EY_DLo9ELRkH1pjgKCWAlgNEfpeeDVvExzdPFuRuSgc2tqUqPDI2tbablgrmXWZ4YWNYRz1IaG6tsq0AHvNogHLhVEy0VILUOt7g0?key=CWdTQ90arHQUB8rnd9b5GQ

Once added, select the application to start the configuration

Netskope Administrator Console > Setup Single Sign on

AD_4nXcDiEE9CRnjMohWobF0afmCHOyaQzFHoQQllaXFh4X_ZJmDCWATK5OxIkP7mQm4kbLfVp6NZbiCkLDnUlSGvMlwR5lhourYKqLw7XVzXHcVNHMJl_R7YIaA7TQ_fjBxw8ERgzvlpdH0xysszOzGGcgZO_F9?key=CWdTQ90arHQUB8rnd9b5GQ

 

Step6: Upload the SP Metadata file (Downloaded in step3-Network Settings) to Azure on the Single Sign-on with SAML page.

AD_4nXf_M4YtskeQnpLnBaGEDWz25POF3fddwHvOQaBJeuWTi3jttPk5F1Ow_8Jw8Yltzag_TTyqfSPLZUORYKX1ANRx3acjMwy69FQ0HXK4eKE8B3owiJMZDXdCF5-rwdc6XtJ5zIq-FwwaS18ei74j-JRaqUZY?key=CWdTQ90arHQUB8rnd9b5GQ



Which will automatically complete the below fields on Azure:

  1. SP Entity ID
  2. SP ACS URL

AD_4nXcS2VvkqzSkAMZmwc7hrMvYv41C2bWd45wfECKiHlT_gz9Mpn9yHkis1Wz78Bb2kP1AVOkm1tvaUWaon0jFpatQgYDsXmO1Yilbl_HTTt5z98oyOGQvDBGZN5EERgsQElDBjPpGypUs46tlBBKFcbjigaDf?key=CWdTQ90arHQUB8rnd9b5GQ

 

Click “Save” to activate the changes & Complete the IDP Configuration.

 

Step7: Download the IDP Certificate and copy the IDP SSO URL & IDP Entity ID from Azure “Single Sign-on with SAML” page. 

AD_4nXffmEEWLuWVm8i1Q5X97xGCWIKqx0BJ8F8xUyoPiII4vzOMOE2gFbrvArM69y62AStCwERwYt9IvBcAukPYZzzJxIuE5cDIWnPYBALGNjVGizTgpYYy7SdV1CTSnj446-uIcQjGEn3g8KlXvgW6piqkc0M3?key=CWdTQ90arHQUB8rnd9b5GQ

 

Step8: Paste the IDP SSO URL & IDP Entity ID along with IDP Certificate to the Netskope SSO configuration (Step3 - Create Account) :-

AD_4nXcjmMQpW4O0urhJPsSF9Zjyg3MfsOO61ebgRpTXY1i53a0jetxacEt46HYzWoxt3FgXnRfS3GYlDA4G3ewzNSM_PlDWLhOgwqmKcKC5uL0ZJe5mf74cVBkwgXJcSVDpwM5ee_AP_2w7B7NtyG1k54Biav8?key=CWdTQ90arHQUB8rnd9b5GQ

 

Recommended (Optional)

**Single Logout (SLO) ensures that when a user logs out from one service (Service Provider), they are also logged out from other services connected to the same Identity Provider (IdP). This provides a unified logout experience across multiple applications that use the same authentication system.

Click “Finish” to complete the Admin SSO Configuration on Netskope (SP).
 

Note: If the tenant is logged off after the 8th step, you can log back into the tenant using local admin credentials by visiting https://<tenant-URL>/locallogin. Once logged in, proceed with the steps below to complete the integration.

 

Step9: Assign Admins to the “Netskope Administrator Console” under “Users and groups” making sure the admins are mapped to the designated role (Access Permissions) first, Netskope will not allow the admin to login into the tenant if not mapped with a role.

*In this “user” term is being used for admins

  1. Create a “App Role”
  2. Assign a user & “App Role” to the Application (Netskope Administrator Console)

 

Netskope Administrator Console > Security > Permissions > Application Registration

AD_4nXe6RA4aEMESSsNlt8BgS7mQINCzkjMPE5XmqKkkhhOTG-1joDjpeIEDp44wQTuOGU5Dt1AQ-cyLHhpqz_AdDlIPcuqzF5gm93it3UVoHdWfUeI2u1m8MB_kTgCZ-Wzijv6Q-elc4vKg7B5Do3CR8emkuAlA?key=CWdTQ90arHQUB8rnd9b5GQ

 

Netskope Administrator Console > Security > Permissions > Application Registration > App roles

AD_4nXcptku-08NrNcEwpiNesk_EqKEI73kufeqa94KYd7VPhr0JLZzHLCBhpQ2tWh52E0TRfJT9ugSe6YKHMetBA2bgobV19w2BuzKvpscVuVlTxaPptpDACAjasYwoezpCm9MPPNyuLZYZH0oAxGzN7x1XBa28?key=CWdTQ90arHQUB8rnd9b5GQ

 

We can create a new app role on Azure using the roles available on the Netskope tenant or we can create new roles on the Netskope tenant and then map them to Azure under the “App roles” page.

=====================

 

Sample

Path: Netskope Tenant UI >>> Settings >>> Administration >>> Roles

AD_4nXc-zzjRViaPY42KPIvvTapXCw6P0ZmE9c25Q7XfWkhsd_L2EAAp9F_80Bhlx5rGJUUICZUKqSuRZAVgyuHozPFXNidFL5MpfMpnvRC2Ay6xETxNAkXgy8lj2u9cPqcX0ARPygX1IGzdmbJtisp06bVGA5A?key=CWdTQ90arHQUB8rnd9b5GQ

 

We can create a new role or use the predefined roles (Name, Value) pair to map the role on Azure.

Name: Tenant Admin

Value: TenantAdmin

Using the same we can create a role on Azure and while assigning map it to the user/admin.

=====================

 

Creating a new role on Azure

Add the Name & value, select the checkbox and hit “Apply” - New role is created successfully.

AD_4nXdunSl4ZZMR6N68vDzo6fLeS65EzQUgu19aLNEdoM0HrP9Cvs_vk320cKtBop3Ahahv5iS9WWEtLNeoWoTHL_Squfie8uC9pCuhUHebJ6ENM8xuvt43Ey3XH33jL4L0BlRGcI_ApXtcZk7-EkEr-uQhidgB?key=CWdTQ90arHQUB8rnd9b5GQ

B.

Assign user/admin to the Netskope Administrator Console application + “App role”

Select “Add user/group”

AD_4nXcLLpEYTbIHqh-fU-MKiU9A_k06aZmFalq05mcXfzmfnm5YDTFt_pdaoyHflj5gPkn9o9rmcKgYJLjCrB37LWU5QgTa2EY7kBbRyAfZKmXXe7fiY7wbeeukEa1NbGKL5u-31eTFoxRHlskyg65giQJ4dIM?key=CWdTQ90arHQUB8rnd9b5GQ

Select User & role which we created under app role and hit “Assign” to map admin to the application along with role (Access Permissions).

AD_4nXeOfzImmK265qv4p2PC6PX8KhsG1tCVNQJNLiVVacuSPNUAIGhdrt6qDcSq3zCNQisfhgl56Eo1-Z8v3vIZAEfuz5ouxgNC-2Z9_sTQtXCRdgt5SUoZA-9ghUgYqlAlyjtCZ-iHUPjfruxbJSiy77ygC44?key=CWdTQ90arHQUB8rnd9b5GQ

 

Step10: Admins can successfully login using the Azure SSO to the Netskope tenant.

Netskope Tenant > Settings > Administration > Admins

AD_4nXe_Psl_hxvjDwXL02SBrjEKL7JuGowdsl-EX33U4GoGWsh3THY80l45Dvo3tZ-2F4t-ZfeCjG4GL13_LtBSZPU-mFFtp3nbxHwMPhAiX6yMQ3WESb_0Uq7l3VfJnEJHi_gMb7Z_etGuFRQL8VcBiCraKiQ?key=CWdTQ90arHQUB8rnd9b5GQ

 

 

Terms and Conditions

  • All documented information undergoes testing and verification to ensure accuracy.
  • In the future, If any such platform changes are brought to our attention, we will promptly update the documentation to reflect them.

 

Notes

  • This article is authored by Netskope Global Technical Success (GTS).
  • For any further inquiries related to this article, please contact Netskope GTS by submitting a support case with 'Case Type – How To Questions'.

 

Be the first to reply!