diff --git a/docs/identity/saas-apps/samsara-tutorial.md b/docs/identity/saas-apps/samsara-tutorial.md index c1676ee4137..db3ea208c85 100644 --- a/docs/identity/saas-apps/samsara-tutorial.md +++ b/docs/identity/saas-apps/samsara-tutorial.md @@ -56,11 +56,11 @@ Configure and test Microsoft Entra SSO with Samsara using a test user called **B To configure and test Microsoft Entra SSO with Samsara, perform the following steps: +1. **[Configure domain verification in Samsara](https://kb.samsara.com/hc/en-us/articles/31499789674893-Verify-Domains-for-Secure-SSO-Authentication#UUID-9e9af4f3-fa9a-e18c-723d-66e148c98140)** - to enable SSO within Samsara, domain verification is a prerequisite. 1. **[Configure Microsoft Entra SSO](#configure-azure-ad-sso)** - to enable your users to use this feature. 1. **Create a Microsoft Entra test user** - to test Microsoft Entra single sign-on with B.Simon. 1. **Assign the Microsoft Entra test user** - to enable B.Simon to use Microsoft Entra single sign-on. -1. **[Configure Samsara SSO](#configure-samsara-sso)** - to configure the single sign-on settings on application side. - 1. **[Create Samsara test user](#create-samsara-test-user)** - to have a counterpart of B.Simon in Samsara that's linked to the Microsoft Entra representation of user. +1. **[Create Samsara test user](#create-samsara-test-user)** - to have a counterpart of B.Simon in Samsara that's linked to the Microsoft Entra representation of user. 1. **[Test SSO](#test-sso)** - to verify whether the configuration works. @@ -73,39 +73,27 @@ Follow these steps to enable Microsoft Entra SSO. 1. Browse to **Entra ID** > **Enterprise apps** > **Samsara** > **Single sign-on**. 1. On the **Select a single sign-on method** page, select **SAML**. 1. On the **Set-up single sign-on with SAML** page, select the pencil icon for **Basic SAML Configuration** to edit the settings. +1. Open your Samsara dashboard and navigate to Settings > Single Sign-On tab. If you want to create a user SSO connection, click **Add** in the user SSO box. If you want to create a driver SSO connection, click **Add** in the driver SSO box. You will need to copy over values from Samsara into Entra ID SAML Configuration. ![Edit Basic SAML Configuration](common/edit-urls.png) -1. On the **Basic SAML Configuration** section, perform the following steps: +1. In Entra ID, on the **Basic SAML Configuration** section, perform the following steps: - a. In the **Sign-on URL** text box, type a URL using one of the following patterns: - `https://cloud.samsara.com/signin/` for US cloud customers - `https://cloud.eu.samsara.com/signin/` for EU cloud customers + a. Copy the link from Service Provider Entity ID field in Samsara into the **Identifier (Entity ID)** text box in Entra ID. - b. In the **Identifier (Entity ID)** text box, type a URL using the following pattern: - `urn:auth0:samsara-dev:samlp-orgid-` - - c. In the **Reply URL** text box, type a URL using the following pattern: - `https://samsara-dev.auth0.com/login/callback?connection=samlp-orgid-` + b. Copy the link from Post-back/ACS URL field in Samsara into the **Reply URL** text box in Entra ID. > [!NOTE] - > These values aren't real. Update these values with the actual Sign-on URL, Reply URL, and Identifier. Contact the [Samsara Client support team](mailto:support@samsara.com) to get these values, or in Samsara, go to **Settings** > **Single-Sign-On** > **New SAML Connection** to obtain the \. You also can refer to the patterns shown in the **Basic SAML Configuration** section. - -1. On the **Set-up single sign-on with SAML** page, in the **SAML Signing Certificate** section, find **Certificate (Base64)** and select **Download** to download the certificate and save it on your computer. - - ![The Certificate download link](common/certificatebase64.png) + > Update these values with the actual Reply URL and Identifier. Contact the [Samsara Client support team](mailto:support@samsara.com) to get these values, or in Samsara, go to **Settings** > **Single-Sign-On** and select the connection you want to create in order to obtain the right ACS and Identifier URLs. -1. On the **Set-up Samsara** section, copy the **login URL** +1. On the **Set-up single sign-on with SAML** page, in the **SAML Signing Certificate** section, find and copy the **App Federation Metadata URL** or download the **Federation Metadata XML**. In the Samsara dashboard in Settings > Single Sign-on in the relevant SSO configuration (user or driver), paste the metadata URL or upload the file. Click **Save** to apply the changes. - ![Copy configuration URLs](common/copy-configuration-urls.png) + entra_id_sso_doc [!INCLUDE [create-assign-users-sso.md](~/identity/saas-apps/includes/create-assign-users-sso.md)] -## Configure Samsara SSO - -To configure single sign-on on **Samsara** side, you need to send the downloaded **Certificate (Base64)** and **Login URL** from Azure portal to [Samsara support team](mailto:support@samsara.com). They set this setting to have the SAML SSO connection set properly on both sides. ### Create Samsara test user @@ -129,4 +117,7 @@ You can also use Microsoft My Apps to test the application in any mode. When you ## Related content +For more information, please refer to the Samsara KB article on SSO configuration. [Samsara SSO KB Article](https://kb.samsara.com/hc/en-us/articles/18709097464077-Single-Sign-On-SSO-Authentication#UUID-ff7f0e21-59f5-e6d4-6b81-2f090c691895_section-idm232308954423931). + + Once you configure Samsara you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Defender for Cloud Apps](/cloud-app-security/proxy-deployment-any-app).