Azure Active Directory SSO
Set up Azure Active Directory SSO to log into the Panther Console
Last updated
Set up Azure Active Directory SSO to log into the Panther Console
Last updated
Panther supports integrating with Azure Active Directory as a SAML provider to enable logging in to the Panther Console via SSO.
For more information on features, terminology, and limitations of SSO integrations with the Panther Console, see Identity & Access Integrations.
In the upper-right corner of your Panther Console, click the gear icon.
In the dropdown menu, click General.
Click the Identity & Access tab.
Keep this browser window open, as you will need the Audience and ACS Consumer URL values in the next steps.
Log in to your Azure Portal.
In the left-hand navigation bar, click Azure Active Directory.
Under Manage, click Enterprise applications.
Click + New application, then + Create your own application.
On the Create your own application screen, configure the following fields:
Input name: Enter a descriptive value, such as "Panther Console."
Integrate any other application you don’t find in the gallery (Non-gallery): Select this radio button.
Click Create.
Within your newly created application, click 1. Assign users and groups.
Click + Add user/group.
Under Users and groups, click the None Selected link.
Select your user(s), then click Select.
Click Assign.
Navigate back to the Enterprise Application Overview, then click 2. Set up Single Sign-on.
On the Select a Single Sign-on method screen, click SAML.
Within Set up Single Sign-on with SAML, make the following configurations:
Under Basic SAML Configuration, click Edit, and configure the following fields:
Add Identifier (Entity ID): Paste the Audience value you obtained in the Panther Console in Step 1.
Add reply URL: Paste the ACS Consumer URL value you obtained in the Panther Console in Step 1.
Under Attributes & Claims, click Edit.
Click + Add new claim and configure the following fields:
Name: Enter PantherEmail
.
Namespace: Leave this field blank.
Source: Select the Attribute radio button.
Source Attribute: Select user.email
.
Click Save.
Click + Add new claim and configure the following fields:
Name: Enter PantherFirstName
.
Namespace: Leave this field blank.
Source: Select the Attribute radio button..
Source Attribute: Select user.givenname
.
Click Save.
Click + Add new claim and configure the following fields:
Name: Enter PantherLastName
.
Namespace: Leave this field blank.
Source: Select the Attribute radio button..
Source Attribute: Select user.surname
.
Click Save.
Under SAML Certificates, next to Federation Metadata XML, click the Download link.
Click Save.
Back in the Panther Console, under the Identity & Access tab, click click here to upload the metadata file you downloaded from Azure.
Click Save Changes.
To test your setup, go to your Panther sign-in page and click Login with SSO.