|
| 1 | +--- |
| 2 | +id: provision-with-microsoft-entra-id |
| 3 | +title: Provision with Microsoft Entra ID |
| 4 | +sidebar_label: Provision with Microsoft Entra ID |
| 5 | +description: Learn how to provision users in Sumo Logic with Microsoft Entra ID (formerly Azure Active Directory). |
| 6 | +--- |
| 7 | + |
| 8 | +import useBaseUrl from '@docusaurus/useBaseUrl'; |
| 9 | + |
| 10 | +This article describes how to provision users in Sumo Logic with Microsoft Entra ID (formerly Azure Active Directory). |
| 11 | + |
| 12 | +## Prerequisites |
| 13 | + |
| 14 | +### Create an access key |
| 15 | + |
| 16 | +Create an [access key](/docs/manage/security/access-keys/). (We recommend using a service account to create the access key.) This access key will provide authorization to provision users from Microsoft Entra ID into Sumo Logic. |
| 17 | + |
| 18 | +When you create the access key, copy its access ID and access key values. You will enter these when you use [Base64 encoding](https://www.base64encode.org/) to Base64 encode `<access ID>:<access key>` to generate a token. |
| 19 | + |
| 20 | +## Configure provisioning with Microsoft Entra ID |
| 21 | + |
| 22 | +### Step 1: Create the app |
| 23 | + |
| 24 | +1. Log in to [Microsoft Azure](http://portal.azure.com/) as an administrator. |
| 25 | +1. Navigate to Microsoft Entra ID. (You can use the search bar to locate it.) |
| 26 | +1. Navigate to **Manage > Enterprise Applications**. |
| 27 | +1. Click **New application**.<br/><img src={useBaseUrl('img/security/provision-azure-new-app.png')} alt="Create new application" style={{border: '1px solid gray'}} width="800" /> |
| 28 | +1. Click **Create your own application**.<br/><img src={useBaseUrl('img/security/provision-azure-create-your-own-app.png')} alt="Create your own application" style={{border: '1px solid gray'}} width="400" /> |
| 29 | +1. Enter a name for the app, select **Integrate any other application you don't find in the gallery (Non-gallery)**. <br/><img src={useBaseUrl('img/security/provision-azure-name-app.png')} alt="Name your application" style={{border: '1px solid gray'}} width="400" /> |
| 30 | +1. Click **Create**. The app displays in Entra ID.<br/><img src={useBaseUrl('img/security/provision-azure-app.png')} alt="App in Entra ID" style={{border: '1px solid gray'}} width="600" /> |
| 31 | + |
| 32 | +### Step 2: Set up single sign-on |
| 33 | + |
| 34 | +Follow the directions in [Configure Sumo as an Enterprise App in Azure AD](/docs/manage/security/saml/integrate-sumo-with-azure-ad/#configure-saml-in-sumo-logic) beginning with the step where you select **Set up single sign on**. |
| 35 | + |
| 36 | +<img src={useBaseUrl('img/security/provision-azure-set-up-sso.png')} alt="Set up single sign on" style={{border: '1px solid gray'}} width="600" /> |
| 37 | + |
| 38 | +When you [configure SAML in Sumo Logic](/docs/manage/security/saml/integrate-sumo-with-azure-ad/#configure-saml-in-sumo-logic): |
| 39 | +* Select **Disable Requested Authentication Context**. |
| 40 | +* Do not select the **On Demand Provisioning** checkbox. You will set up provisioning later. |
| 41 | + |
| 42 | +### Step 3: Add roles |
| 43 | + |
| 44 | +Create roles that the users will have in Sumo Logic (for example, `Analyst` and `Administrator`). |
| 45 | + |
| 46 | +1. In the app, select **Manage > Users and groups**. |
| 47 | +1. Select **application registration**.<br/><img src={useBaseUrl('img/security/provision-azure-app-registration.png')} alt="Add users" style={{border: '1px solid gray'}} width="700" /> |
| 48 | +1. Click **Create app role**.<br/><img src={useBaseUrl('img/security/provision-azure-create-app-role.png')} alt="Create app role" style={{border: '1px solid gray'}} width="700" /> |
| 49 | +1. Create the role: |
| 50 | + 1. In **Display name**, enter the name to be displayed in the UI (for example, `Analyst`). |
| 51 | + 1. For **Allowed member types** select **Both**. |
| 52 | + 1. For **Value** enter the value of the role in Sumo Logic (for example, `Analyst`). |
| 53 | + 1. For **Description** enter a description of the role. |
| 54 | + 1. Click **Apply**.<br/><img src={useBaseUrl('img/security/provision-azure-create-app-role-dialog.png')} alt="Create app role dialog" style={{border: '1px solid gray'}} width="400" /> |
| 55 | + |
| 56 | +### Step 4: Assign users to the app |
| 57 | + |
| 58 | +1. In the app, select **Manage > Users and groups**. |
| 59 | +1. Select **Add user/group**.<br/><img src={useBaseUrl('img/security/provision-azure-add-users.png')} alt="Add users" style={{border: '1px solid gray'}} width="600" /> |
| 60 | +1. Under **Users**, click **None Selected**.<br/><img src={useBaseUrl('img/security/provision-azure-add-assignment.png')} alt="Add Assignment" style={{border: '1px solid gray'}} width="400" /> |
| 61 | +1. From the list of available users, select users to add to the app and click **Select**. |
| 62 | +1. Under **Select a role** click **None Selected**. |
| 63 | +1. From the list of available roles, select a role (for example, **Analyst**). |
| 64 | +1. Click **Assign**. |
| 65 | + |
| 66 | +### Step 5: Set up provisioning |
| 67 | + |
| 68 | +1. In the app select **Manage > Provisioning**.<br/><img src={useBaseUrl('img/security/provision-azure-provisioning.png')} alt="Connect your application" style={{border: '1px solid gray'}} width="600" /> |
| 69 | +1. For **Provisioning Mode**, select **Automatic**. |
| 70 | +1. Enter **Admin Credentials**: |
| 71 | + 1. In **Tenant URL**, enter the [API endpoint for your deployment](/docs/api/getting-started/#sumo-logic-endpoints-by-deployment-and-firewall-security) for the [SCIM User Management APIs](/docs/api/scim-user/) using the format `<api-endpoint>/v1/scim/`. For example, `https://api.sumologic.com/api/v1/scim/`. |
| 72 | + 1. For **Secret Token**, use [Base64 encoding](https://www.base64encode.org/) to encode `<access ID>:<access key>` (see [Prerequisites](#prerequisites)). Enter the resulting value into the **Secret Token** field. |
| 73 | + 1. Click **Test Connection**. If successful, a message like this appears: **Testing connection to `<app name>`. The supplied credentials are authorized to enable provisioning**. |
| 74 | +1. Set up mappings: |
| 75 | + 1. Select **Mappings** and **Provision Microsoft Entra Users**.<br/><img src={useBaseUrl('img/security/provision-azure-mappings.png')} alt="Provision mappings" style={{border: '1px solid gray'}} width="600" /> |
| 76 | + 1. At the bottom of the **Attribute Mapping** dialog, select **Add New Mapping**. |
| 77 | + 1. Fill out the **Edit Attribute** dialog: |
| 78 | + 1. For **Mapping type** select **Expression**. |
| 79 | + 1. For **Expression** enter `AppRoleAssignments([appRoleAssignments])`. |
| 80 | + 1. For **Target attribute** select `roles[primary eq "True"].value`. |
| 81 | + 1. Click **OK**.<br/><img src={useBaseUrl('img/security/provision-azure-role-attribute.png')} alt="Edit attribute" style={{border: '1px solid gray'}} width="600" /> |
| 82 | + 1. On the **Attribute Mapping** dialog, delete all the attributes except: |
| 83 | + * userName |
| 84 | + * active |
| 85 | + * emails[type eq "work"].value |
| 86 | + * name.givenName |
| 87 | + * name.familyName |
| 88 | + * roles[primary eq "True"].value |
| 89 | + 1. Click **Save**.<br/><img src={useBaseUrl('img/security/provision-azure-attribute-mappings.png')} alt="Attribute mappings" style={{border: '1px solid gray'}} width="600" /> |
| 90 | +1. Click the **Home > `<app name>` | Provisioning** link in the top left corner of the screen. This returns you to the **Provisioning** tab. |
| 91 | +1. Test provisioning: |
| 92 | + 1. In the app, select **Manage > Provisioning**. |
| 93 | + 1. For **Provisioning Status** select **On** to enable provisioning. |
| 94 | + 1. Click **Save**.<br/><img src={useBaseUrl('img/security/provision-azure-provisioning-status.png')} alt="Provisioning status" style={{border: '1px solid gray'}} width="600" /> |
| 95 | + 1. Select **Overview**. |
| 96 | + 1. Select **Provision on demand**.<br/><img src={useBaseUrl('img/security/provision-azure-provision-on-demand.png')} alt="Provision on demand" style={{border: '1px solid gray'}} width="600" /> |
| 97 | + 1. Users assigned the app will be provisioned into Sumo Logic. |
| 98 | + |
| 99 | +As long as the app's provisioning status is on, the app runs auto provisioning every 40 minutes. |
| 100 | + |
| 101 | +### Step 6: Verify provisioning |
| 102 | + |
| 103 | +Users assigned to the app are provisioned into Sumo Logic. |
| 104 | + |
| 105 | +1. Verify in Microsoft Entra ID: |
| 106 | + 1. In the app, select **Provisioning** and then select the **Monitoring** tab. |
| 107 | + 1. The tab should show provisioning status. Click **View Provisioning Logs** for details. |
| 108 | +1. Verify in Sumo Logic: |
| 109 | + 1. Log in to the Sumo Logic instance that you linked to the provisioning app in Step 2 when you provided the Assertion Consumer URL and entity ID. |
| 110 | + 1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the main Sumo Logic menu, select **Administration > Users and Roles > Users**. <br/>[**New UI**](/docs/get-started/sumo-logic-ui). In the top menu select **Administration**, and then under **Users and Roles** select **Users**. You can also click the **Go To...** menu at the top of the screen and select **Users**. |
| 111 | + 1. Search for the users provisioned from Microsoft Entra ID. |
| 112 | + 1. You should see the users listed, and with the role given to them when you assigned them to the app in Microsoft Entra ID. |
| 113 | + |
| 114 | +## Syncing between Microsoft Entra ID and Sumo Logic |
| 115 | + |
| 116 | +When you modify the name, email, or role of a user assigned the app in Microsoft Entra ID, the changes will be synced to the corresponding user in Sumo Logic. |
| 117 | + |
| 118 | +If you unassign a user from the app in Microsoft Entra ID, the corresponding user is deactivated in Sumo Logic. (If you later try to reassign that same user to the app, it will result in an error in Sumo Logic. You must delete the old user from Sumo Logic first so that the user can be provisioned once again from Microsoft Entra ID.) |
0 commit comments