Single Sign-On with Microsoft
Step 1: Set the Base URL
- In the CloudQuery Platform sidebar, click on your user profile, then select Organization settings.
- Switch to the Single Sign-On tab.
- In the Base URL field, enter the HTTPS URL for your platform installation and click Submit.
- This should be the domain or subdomain where you host CloudQuery Platform, e.g.,
https://cloudquery.example.com.
- This should be the domain or subdomain where you host CloudQuery Platform, e.g.,
Configuration of your domain name in CloudQuery platform
Step 2: Register an Application in Microsoft Entra ID
- In a new tab, navigate to Microsoft Entra ID (Azure AD).
- Click Enterprise Applications → New Application.
- Click Create your own application.
- Enter a name for the application, such as CloudQuery, and select Integrate any other application you don’t find in the gallery (Non-gallery).
- Click Create.
Creating a new enterprise application
Step 3: Configure SAML-based SSO
- Inside the newly created application, navigate to Single sign-on under Manage section.
- Select SAML as the sign-in method.
Setup of SAML protocol
- Click Edit under Basic SAML Configuration.
- Enter the following details:
- Identifier (Entity ID): Copy this value from the CloudQuery Admin panel.
- Reply URL (ACS URL): Copy this value from the CloudQuery Admin panel.
- Click Save.
SAML configuration with values from CloudQuery admin page
Step 4: Download & Upload Metadata
- Scroll down to the SAML Certificates section.
- Click Download next to Federation Metadata XML.
- This will download a file named
MicrosoftIDPMetadata.xml.
- This will download a file named
Download of Federation Metadata XML file
In the CloudQuery Admin panel, click Upload metadata file and upload the MicrosoftIDPMetadata.xml file as shown in the figure below:
Uploading federation metadata XML file
Step 5: Configure User Attributes & Claims
- Click Edit in the Attributes & Claims section.
- Add the following mappings:
- Given name →
first_name - Surname →
last_name - Email address →
email
- Given name →
- Click Save.
Configuration of attributes
Step 6: Assign Users and Groups
- In the Users and groups section, click Add user/group.
- Select the users or groups that should have access to CloudQuery.
- (Optional) To map groups to specific CloudQuery Platform roles, create Microsoft Entra ID Groups for each role level and assign users accordingly.
- In the CloudQuery Platform SSO settings, set the Group attribute field and configure role mappings. See Map Groups to User Roles for full configuration.
Step 7: Enable User Access
- Navigate to Enterprise Applications → CloudQuery.
- Click Properties.
- Set Enabled for users to sign in? to Yes.
- Click Save.
Enablement of sign-in
Step 8: Save and Test
- In the CloudQuery Admin panel, click Save and enable.
- In the Microsoft Entra ID portal, click Test SAML login.
- If everything is configured correctly, you can log into CloudQuery Platform with your Microsoft account.
Next Steps
- Map Groups to Roles - Map Entra ID groups to platform roles
- Certificate Rollover - Manage certificate updates
- User Management - Manage users and roles
Last updated on