StepSecurity
ResourcesCompanyPricingInstall StepSecurity AppLogin
  • Introduction
  • Getting Started
    • Quickstart (Community Tier)
      • Getting Started with Secure Workflow
      • Getting Started with Secure Repo
      • Getting Started with Harden Runner
    • Quickstart (Enterprise Tier)
  • Guides
    • How to enable network and runtime monitoring (Harden-Runner) for runners
    • How to restrict network connections to explicitly allowed endpoints
    • How do I authenticate with the StepSecurity app
    • How should I improve the security of third-party actions in my organization
    • How should I reduce the number of Harden-Runner anomalous endpoint alerts
    • How can developers see and fix StepSecurity findings without security’s help?
  • Overview
  • Harden-Runner
    • Workflow Runs
    • All Destinations
    • Detections
    • GitHub Checks
    • Suppression Rules
    • Policy Store
    • Self-Hosted Runners
    • Runbooks
      • Anomalous Outbound Network Calls
      • How to Determine Minimum Token Permissions
  • Orchestrate Security
    • Policy Driven PRs
    • Secure Workflow
    • Secure Repo
    • Pull Requests
  • Workflow Run Policies
    • Policies
    • Policy Evaluations
  • Artifact Monitor
  • Actions Secret
  • Actions
    • GitHub Actions In Use
    • Reusable Workflows
    • GitHub Actions Score
    • StepSecurity Maintained Actions
  • Settings
    • Notifications
    • Self-Hosted Runners
    • API Key
    • GitHub Checks
    • Control Evaluation
  • Admin Console
    • Resources
    • Integrations
      • S3 Integration
      • Webhook Integration
    • Members
    • Security & Auth
      • Setting Up Google SSO
      • Setting Up Okta SSO
      • Setting Up Microsoft Entra (Azure AD)
    • Audit Logs
  • Partnerships
    • RunsOn
  • Who's Using Harden-Runner?
  • Enterprise Readiness
Powered by GitBook
On this page

Was this helpful?

Export as PDF
  1. Admin Console
  2. Security & Auth

Setting Up Microsoft Entra (Azure AD)

PreviousSetting Up Okta SSONextAudit Logs

Last updated 1 month ago

Was this helpful?

This document outlines the steps required to set up Microsoft Entra (formerly Azure AD) SSO integration with StepSecurity.

Setup Instructions

Step 1: Create a New Enterprise Application

  • Navigate to your Microsoft Entra Admin Portal.

  • Create a new Enterprise Application.

  • Name the application StepSecurity.

Step 2: Configure Single Sign-On

  • After creating the application, go to the Single Sign-On section.

  • Select SAML as the SSO method.

Step 3: Provide SAML Configuration

  • In the SAML Basic Configuration, enter the following values:

Identifier (Entity ID)

urn:amazon:cognito:sp:us-west-2_PGbAJDNzx

Reply URL (Assertion Consumer Service URL)

https://login.app.stepsecurity.io/saml2/idpresponse

  • Leave all other properties with their default values unless specified otherwise.

Step 4: Download and Share Metadata

  • After completing the configuration, download the Federation Metadata XML file.

  • Share the metadata file with StepSecurity securely.