Azure Active Directory (AD) is now Microsoft Entra ID.
Pre-Deployment Checklist
Before configuring SAML integration between Aviatrix and Entra ID, make sure the following is completed:- The Aviatrix Controller and CoPilot are deployed.
- You have an Azure account.
- You have downloaded and installed the Aviatrix SAML VPN client (if you are configuring access to the cloud environment using Aviatrix UserVPN).
Aviatrix VPN Client
If configuring Aviatrix VPN access, download the client for your OS here.Custom SAML Request Template
This can be used in either the Controller/CoPilot or the UserVPN SAML setup.Configuration Steps
Follow these steps to configure Aviatrix to authenticate against your Entra ID IdP:-
Create a SAML Endpoint in Aviatrix CoPilot:
- For controlling user access to Controller and CoPilot: Administration > User Access > Access Management
- For controlling user access to the cloud environment using UserVPN: Cloud Fabric > UserVPN > Settings
- Create an Entra ID SAML Application for Aviatrix in the Azure Console.
Entra ID Custom SAML Application
Before you start, pick a short name to be used for the SAML application name. In the notes below we will refer to this as aviatrix_EntraID. The string you select for the SAML application name is used to generate a URL for Azure AD to connect with Aviatrix. This URL is defined below as SP_ACS_URL. This URL should be constructed as:Creating the SAML Endpoint
In CoPilot, go to one of the following locations, depending on your objective:- Controller/CoPilot access: Cloud Fabric > Administration > User Access > Access Management
- User cloud environment access: Cloud Fabric > UserVPN > Settings
Access Management (Controller/CoPilot)
-
At Administration > User Access > Access Management, click +SAML Endpoint and populate the Create SAML Endpoint dialog as follows.
Field Description Name Entra ID - This name is later chosen from the login menu when authenticating. You can configure multiple SAML configurations if desired. Identity Provider Metadata Type Select URL Identity Provider Metadata URL https://www.aviatrix.com (temporary, because the IdP is not yet configured; you will change it later). Entity ID Select Hostname Access Set By Controller: if this is selected you need to create a separate SAML endpoint for each permission group you want to grant access to. SAML Identity Provider Attribute: This allows the Identity Provider to control what access is allowed for the authenticated user by sending the “Profile” attribute. If this is selected you can also choose to block empty profiles. When Block Empty Profiles is selected, users without explicitly set permissions are not granted access. If empty profiles are allowed, users who do not have a set profile from the IdP are treated as ‘read_only’ users. Custom SAML Request Template If desired, copy the sample provided in the above section (Custom SAML Request Template).