Azure Active Directory SSO
Set up Azure Active Directory SSO to log into the Panther Console
Overview
Panther supports integrating with Azure Active Directory as a SAML provider to enable logging in to the Panther Console via SSO.
For more information on features, terminology, and limitations of SSO integrations with the Panther Console, see Identity & Access Integrations.
How to configure SAML SSO to the Panther Console with Azure Active Directory
Step 1: Obtain the Azure Active Directory SSO parameters from Panther
Log in to the Panther Console.
In the upper-right corner, click the gear icon, and then click General.
Navigate to the Identity & Access tab.
Next to Enable SAML (Security Assertion Markup Language), set the toggle to
ON.(Optional) If using IdP-initiated login, set the Use IdP-Initiated Single Sign On (SSO) toggle to
ON.Copy the the Audience and ACS Consumer URL values and store them in a secure location. You will need them in the following steps.
If using IdP-initiated login, also copy the Relay State value.

Step 2: Create a Microsoft Azure Enterprise Application
Log in to your Azure Portal.
In the left-hand navigation bar, click Azure Active Directory.
Under Manage, click Enterprise applications.
Click + New application, then + Create your own application.
On the Create your own application screen, configure the following fields:
Input name: Enter a descriptive value, such as "Panther Console."
Integrate any other application you don’t find in the gallery (Non-gallery): Select this radio button.
Click Create.
Step 3: Configure your Microsoft Azure Enterprise Application
Within your newly created application, click 1. Assign users and groups.
Click + Add user/group.
Under Users and groups, click the None Selected link.
Select your user(s), then click Select.
Click Assign.
Navigate back to the Enterprise Application Overview, then click 2. Set up Single Sign-on.
On the Select a Single Sign-on method screen, click SAML.
Within Set up Single Sign-on with SAML, make the following configurations:
Under Basic SAML Configuration, click Edit, and configure the following fields:
Add Identifier (Entity ID): Paste the Audience value you obtained in the Panther Console in Step 1.
Add reply URL: Paste the ACS Consumer URL value you obtained in the Panther Console in Step 1.
(Optional) Add Relay State for IdP-Initiated SSO: If using IdP-initiated login, paste the Relay State value you copied from the Panther Console in Step 1. If using SP-initiated login, leave this value blank.
Under Attributes & Claims, click Edit.
Click + Add new claim and configure the following fields:
Name: Enter
PantherEmail.Namespace: Leave this field blank.
Source: Select the Attribute radio button.
Source Attribute: Select
user.email.
Click Save.
Click + Add new claim and configure the following fields:
Name: Enter
PantherFirstName.Namespace: Leave this field blank.
Source: Select the Attribute radio button..
Source Attribute: Select
user.givenname.
Click Save.
Click + Add new claim and configure the following fields:
Name: Enter
PantherLastName.Namespace: Leave this field blank.
Source: Select the Attribute radio button..
Source Attribute: Select
user.surname.
Click Save.
Under SAML Certificates, next to Federation Metadata XML, click the Download link.
Click Save.
Step 4: Configure the Panther Console with Azure AD SSO
Navigate back to the Identity & Access section in the Panther Console from Step 1. In the Default Role field, choose the Panther role that your new users will be assigned by default when they first log in via SSO.
Panther highly recommends not setting this value to
Admin.Click click here to upload the metadata file you downloaded from Azure.

Click Save Changes.
To test your setup, go to your Panther sign-in page and click Login with SSO.

Last updated
Was this helpful?

