Support Center > Search Results > SecureKnowledge Details
How to configure G Suite and Microsoft Azure AD with CloudGuard SaaS Authentication Service Technical Level
Solution

This page describes how to configure CloudGuard SaaS to work with Microsoft Azure AD as an Identity Provider and G Suite as a Service Provider. After the configuration is finished, all login requests to G Suite will go through the CloudGuard SaaS Authentication Service.

Table of Contents:

  • Prerequisites
  • Procedure
    • Add and configure Azure AD as an Identity Provider
    • Configure G Suite to use the CloudGuard SaaS Authentication Service as Identity Provider

Important Notes

  • This procedure will impact all G Suite users in your domain; it cannot be done only for specific user groups.
  • The change of Identity Provider in G Suite takes effect immediately.
  • Besides the configuration described in this article, you need to associate G Suite to CloudGuard SaaS in order to synchronize your users. This is done under Identity Protection\Configuration\SaaS Applications. Please consult the Identity Protection Admin Guide, section Getting Started - Initial Configuration, for more details.

Prerequisites

  • Administrator privileges in Microsoft Azure AD and G Suite 
  • Premium subscription to Microsoft Azure AD

Procedure

Add and Configure Azure AD as an Identity Provider

  1. Log into CloudGuard SaaS portal and go to Configuration under the module Identity Protection. Under the tab Identity Providers, click on Add Identity Provider.
  2. A wizard will open. Select Microsoft Azure AD and click Next.
  3. Enter your domain name and click Next.
  4. Copy the Entity ID and the Reply URL to a text file and save them for later. Click Next.
  5. Log into the Microsoft Azure AD admin console (https://portal.azure.com). In the left pane, click on Azure Active Directory.
  6. In the sub menu bar, click on Enterprise Applications.
  7. Click on New Application.
  8. Choose to create a Non-gallery application. Give a display name to your new application, for example 'CGS Authentication Service'. Click Add.
  9. You will be redirected to the new Application dashboard. Navigate to the menu item Single sign-on and select SAML as the SSO method.
  10.  

  11. The SAML configuration page will now open. In section 1, Basic SAML Configuration, click the pencil icon to edit.
  12. In Identifier and Reply URL, paste, respectively, the Entity ID and Reply URL copied from the CloudGuard SaaS portal in step # 4. Click Save and then close.
  13.  

  14. In section 3, SAML Signing Certificate, download the federation metadata xml file.
  15. Go back to the Add Identity Provider wizard in CloudGuard SaaS and upload the metadata file just downloaded from the Azure AD management console. Click Next.
  16. In the Azure AD management console, navigate to Users and groups and click Add user.
  17. Select all your G Suite users and click Select and then Assign.
  18. Sign out from the Azure AD management console. Then, go back to the Add Identity Provider wizard in CloudGuard SaaS and click the button Check Connectivity. This will open an Azure AD login form where you will be prompted to enter your email address and password. After validation, you should see a Login Success message.
  19.  

Configure G Suite to use CloudGuard SaaS Authentication Service as an Identity Provider

  1. In the CloudGuard SaaS portal, navigate to Configuration under Identity Protection. In the box corresponding to the Azure AD Identity Provider you just configured, click on Click to add SaaS.
  2. A wizard will now open. Select G Suite and click Next
  3. Entity ID and Reply URL are pre-filled. Click Next.
  4. Copy and paste the Sign-in page URL and the Sign-out page URL to a text file and save for later. Download the certificate and click Finish to save and close the wizard.
  5. Log into the G Suite admin console. Click on Security.
  6. Scroll down to section Set up single sign on (SSO) and expand it.
  7. Check the boxes Setup SSO with third party identity provider and Use a domain specific issuer.
  8. Upload the certificate downloaded in step 4 from the CloudGuard SaaS portal. We recommend doing this before filling out the Sign-in page and Sign-out page URLs due to a randomly observed Google behavior that clears out the URLs after uploading the certificate.
  9. Fill out the Sign-in page URL and the Sign-out page URL with the URLs provided by the Add Service Provider wizard in step 4. You can leave empty the Change password URL. Click Save.
  10. All login requests to G Suite will now go through the CloudGuard SaaS Authentication Service before reaching the Azure AD. Login events will be shown in the CloudGuard SaaS portal under Identity Protection\Events.
This solution has been verified for the specific scenario, described by the combination of Product, Version and Symptoms. It may not work in other scenarios.

Give us Feedback
Please rate this document
[1=Worst,5=Best]
Comment