WS-Fed Integration Guide
Overview
This guide is for integrating Web Services Federation (WS-Fed) with Beyond Identity for phishing-resistant and passwordless authentication for logins. Each section covers the steps required to complete the integration. View the following points for a general summary.
- Add a new WS Fed application
- Configure attributes in Beyond Identity
- SCIM to map users and attributes to Beyond Identity
- Federating a new domain
- Testing for end users
Prerequisites
To get started with the integration, view the following prerequisites.
Microsoft Entra ID
This information contains the necessary items for integrating with Beyond Identity.
- Microsoft Entra ID global administrator privileges
- Active Entra ID P1 license
- Domain added to Entra, must not be federated
- NOTE: If domain is already federated, complete the unfederating process before continuing.
- Powershell configurations for administrators
- SCIM implementation for Microsoft Entra as upstream directory source to Beyond Identity
- View the Generic SCIM for more information.
Beyond Identity requirements
The list below covers the basic Beyond Identity requirements for the integration.
- Secure Access Tenant with Super Admin Role
- Use an existing account, or sign up here to create a new Beyond Identity account
- Have at least two devices and two Super Admin roles configured*
- *Recommended, optional
Steps
Follow the steps in the sections below to complete your integration for Beyond Identity and Microsoft Entra ID.
Legend
The sections below use these two color codings to identify the steps for separate platforms. Use a separate browser window when following instructions for each platform.
🔵 Beyond Identity - Beyond Identity platform tasks are highlighted in blue.
🟠 Microsoft Entra ID - Microsoft Entra ID platform and Powershell tasks are highlighted in orange.
🔵 Add new WS-Fed application in Beyond Identity console
The following section covers the 🔵 Beyond Identity console and related steps. For convenience, use a separate browser window for this section.
- Under Access Control → Applications, click WS-Fed.
- On the WS-Fed page, click Add WS-FED.
- On the New SSO Application page, fields with * are required. Under the General section, input the Display Name* information.
- Under the Configuration section, input the following information into the respective fields.
- ACS URL (SSO URL)* -
https://login.microsoftonline.com/login.srf
- Audience URL (Entity ID)* -
urn:federation:MicrosoftOnline
- ACS URL (SSO URL)* -
- For the Subject User Name Attribute field, select External ID in the dropdown.
🔵 Configure attributes in Beyond Identity
Follow the steps below to copy important values from 🔵 Beyond Identity and paste them into the application configuration fields.
- On the New SSO Application page, scroll down to the **Attribute Statements (Optional) **section.
- Four additional attributes are required for this configuration. Click Add Attribute multiple times to add blank attribute rows.
- Use the table below to input the additional attributes.
Service Provider Attribute Name | Name Format | Beyond Identity Attribute Name | Namespace |
---|---|---|---|
immutableID | unspecified | External ID | http://schemas.microsoft.com/LiveID/Federation/2008/05/ImmutableID |
emailaddress | unspecified | http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress | |
UPN | unspecified | Username | http://schemas.xmlsoap.org/claims |
authnmethodsreferences | unspecified | Custom string http://schemas.microsoft.com/claims/multipleauthn | http://schemas.microsoft.com/claims |
- Click Save Changes at the top of the page.
🟠 SCIM Entra users to Beyond Identity
At this point in the guide, complete the process for bringing Entra users to Beyond Identity. Use the Entra platform to complete the SCIM to map users and attributes to Beyond Identity for the integration. The requirements below are for mapping attributes to add and modify.
On the Attribute Mapping page for Provisioning in Microsoft Entra, confirm the customappsso Attributes and corresponding Microsoft Entra ID Attributes configurations.
emails[primary eq true].value
, set Apply this mapping to Alwaysemails[type eq "work"].value
, set Apply this mapping to Only During Object CreationexternalID
→immutableId
Confirm all users are in Entra before federating the domain. Adding new users in Entra after federating causes issues. See the Add new users after federation section for more.
🔵🟠 Federate the domain
The sections below have the steps for federating the domain to use with Beyond Identity.
🔵 Secure Access console configuration
The process below is for viewing the Secure Access console information about the federation process.
- On the New SSO Application page, scroll down to the General section.
- Click View Federation Script.
- On the Generate Federation Script pop up, input your domain to the Domain Name* field.
- Click Generate.
- When the Script Generated! notification appears, click the Download button.
🟠 Executing in Powershell
These steps are for executing the script in 🟠 Powershell to federate the domain.
- In your Powershell environment, open the downloaded file from Step 5 of the Secure Access console configuration section.
- Run the file in your Powershell environment.
- For the Security warning pop up, click Run once.
- The browser window appears for the log in to Microsoft. Continue to pick your account for the login.
- Close the Generate Federation Script pop up. The domain is federated after logging in. According to Microsoft, domain federation can take up to 30 Minutes.
🔵 Select identities in Beyond Identity
Before continuying with the next steps, complete the sections in the Generic SCIM guide for configuring users from the upstream directory source. The following section contains the steps to add identities as assignments for using Beyond Identity in the integration.
NOTE: Adding new users after federating the domain causes a sourceanchor
issue in Entra. See the Add new users after federation section for more.
- Return to the New WS Fed Integration page in Beyond Identity.
- At the top of the page, click on the Assignments tab.
- Click the Add Assignments drop down.
- Select By Identity.
- On the Add Identities pop up, select the identity to use.
- Click Add Identity.
- At the top of the page, click on the Settings tab.
- Click Save Changes at the top of the page.
Congratulations! You've completed your Beyond Identity integration!
🟠 Process for Microsoft user login
The section below has information on the process for end users to log in using Beyond Identity in the integration.
- Navigate to the Microsoft login page.
- Type the login information of the credentials from the federated domain.
- Click Next.
- This continues with the Beyond Identity Platform Authenticator process. Select the account corresponding to the federated domain.
- Continue with the Microsoft login procedure.
🟠 Add new users after federation
If adding users to Entra after federating your domain, the sourceanchor
issue occurs in Entra. The following code is a solution to create new users after federing the domain.
Execute the Powershell script below to create new users and add the immutableID
value for mapping to prevent the issue in the integration. Contact your Beyond Identity representative for additional support, if needed.
Install-Module MSOnline
Connect-MsolService
$upn = "[email protected]"
Write-Output "Calling Get-MsolUser"
$user = Get-MsolUser -UserPrincipalName $upn
Write-Output "User $user"
$uuid = [system.convert]::ToBase64String(([GUID]$user.objectID.Guid).ToByteArray())
Write-Output "$uuid"
Set-Msoluser -UserPrincipalName $upn -ImmutableID $uuid