Skip to main content

SAML SSO with Microsoft Entra ID

This article describes how to set up SAML Single Sign-on for Semgrep AppSec Platform with Microsoft Entra ID.

Prerequisites
  • An existing Microsoft Entra ID account.
  • Sufficient permissions within Microsoft Entra ID to create enterprise apps. See Microsoft Entra ID roles.
  • Admin privileges for your Semgrep deployment.

Setting up SAML SSO using Microsoft Entra ID consists of the following general steps:

  1. Create a custom enterprise app within Microsoft Entra ID.
  2. Set up SAML SSO for your new enterprise app.
  3. Configure Semgrep.
  4. Add users to your new enterprise app.

Configure SSO

  1. Sign in to Semgrep AppSec Platform.
  2. Go to Settings > Access > Login methods.
  3. In the Single sign-on (SSO) section, provide a valid Email domain, then click Initialize.
  4. The Configure Single Sign-On dialog appears to guide you through the remaining configuration steps. Begin by selecting Entra ID (Azure AD) SAML.
  5. Follow the instructions provided on the subsequent Configure Single Sign-On dialog pages to complete this process. When you've completed the required steps, use Test sign-in to test the connection.
  6. Once test sign-in has passed, close the test page. Verify that the Connection details shown on the Connection activated screen are correct and close the dialog.
  7. Verify that the Connection status is now active under the Single sign-on (SSO) section in Semgrep AppSec Platform.
  8. To use the new connection, log out of Semgrep, then log back in using SSO.

Add users to your new enterprise app

To add users to the application in so they can log in with their domain emails, refer to Assign users and groups to an application.


Not finding what you need in this doc? Ask questions in our Community Slack group, or see Support for other ways to get help.