Note: Be sure to leave the Azure namespace URL field blank. Add new attributes in lowercase, exactly as shown below.In Azure AD's Set up Single Sign-On with SAML screen, go to User Attributes & Claims > click the pencil icon.Under the Reply URL (Assertion Consumer Service URL) section, paste the previously-copied Solicited Whitelist URL into the empty entry.In Azure AD's Set up Single Sign-On with SAML screen, go to Basic SAML Configuration > click the pencil icon.On the Nebula Single Sign-On page, copy the Solicited Whitelist URL.Upload the metadata.xml file you downloaded from the Nebula platform.In Azure AD, click Upload metadata file.On the Nebula Single Sign-On page, left-click the Service Provider Metadata link to save the metadata.xml file.Click Single sign-on > select SAML-based Sign-on from the Single Sign-on Mode drop down menu.From the Enterprise applications page in Azure AD, click New application > Non-gallery application.Refer to Malwarebytes Nebula platform Administrator Guide for details. Ensure your environment meets the minimum operating system and external access requirements.Log in to your Azure AD Administrator account and go to Azure Active Directory > Enterprise applications.Log in to Malwarebytes Nebula and go to Configure > Single Sign-on.The email address used for the Nebula account must match the email address used for Azure AD.Nebula only supports SAML 2.0 authentication protocol. The following instructions will assist the iDP Administrator with the setup of single sign-on (SSO) for Malwarebytes Administrators into the Nebula platform using Azure AD.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |