Whitespots Wiki
Login
  • Home
  • 🔦Auditor
    • 📥Deployment
      • Installation
      • Update
    • 🎯Features
      • 🚀Run Audit
        • AppSec Portal cooperation
        • Direct use of Auditor
      • ⚙️Settings
        • AppSec Portal cooperation
        • Direct use of the Auditor
          • Cleaner
          • Docker Credentials
          • Workers
          • Personalization
        • Jobs
          • Technical Jobs
          • Scanner Jobs
          • Job configuration
    • 🗒️Release notes
    • 🩼Maintenance
  • 🖥️AppSec Portal
    • 📥Deployment
      • License obtaining
      • Installation
      • Get started with the AppSec Portal
        • Сonfiguration options
      • Update
      • Accessing the AppSec Portal API Endpoints
      • Database transfer guide
      • FAQ: typical errors in deployment process
    • ⚙️Post install Configuration
    • 🎯Features
      • 🎣Auto Validator
        • Rule creation
        • Rules view
      • Deduplicator
        • ⚙️Basic deduplicator rules
        • ⚙️Advance Deduplicator rules
      • 🔦Vulnerability discovery
        • ✔️Audits
        • ⚙️Auditor settings
          • Auditor config
          • Sequences
            • Sequences creating
            • Sequences setting
        • 🔎Run audit
          • Run Audit Manually
          • Scheduled Audit Run
      • 🎯Recommendations
      • Security Metrics
        • Severity Statistics Dashboard
        • WRT (Weighted Risk Trend)
        • How to work with WRT (for team leads)
        • Metrics settings
          • SLA
        • CVSS
          • CVSS Rule
      • Custom Reports
      • 📈Active tasks
      • 🧺Asset management
        • How to import repositories from version control
        • Default product
        • Adding a product asset
        • Asset Transfer Between Products
      • 🕷️Findings view
        • All findings view
        • Grouped findings as a result of
        • Grouping of findings into groups
        • Available bulk actions
        • Viewing specific findings
        • Usable filters and easy sorting
      • 📊Jira
        • Jira integration configuration
        • Setting up Jira webhook
      • 👾Move from DefectDojo
      • 🔬Scanners
        • 🔌Importing reports from scanners to AppSec Portal
          • 🖐️Manual Import using Report File
          • Importing reports via Terminal using a Report File
          • Importing reports via Lambda Function using a Report File
        • Scanner description
          • Code Scanners
            • Bandit
            • Brakeman
            • Checkov
            • CodeQL
            • ESLint
            • Gemnasium
            • Gosec
            • Hadolint
            • KICS
            • PHPCodeSniffer
            • Retire.js
            • Semgrep
            • SpotBugs
            • Terrascan
          • Secret Scanners
            • Gitleaks
            • Trufflehog3
          • Image and code dependency Scanners
            • Trivy
            • Trivy vulners.com plugin
            • Snyk
          • Web Scanners
            • Arachni Scan
            • Acunetix
            • Burp Enterprise Scan
            • OWASP Zap
          • Infrastructure Scanners
            • AWS Security Hub Scan
              • Importing reports via AWS Lambda Function within AWS Security Hub
            • Prowler
            • Subfinder
            • Nessus
            • Nuclei
          • Mobile Security Scanners
            • MobSFScan
          • Other Scanners
            • Dependency-Track
            • Whitespots Portal
      • 📦Working with products
        • Product Creation
        • Product options
        • Finding groups
        • Risk assessment
        • Product Asset
    • 🛠️General Portal settings
      • Version Control Integration
      • Profile
      • Managing user roles and access control
        • User management
        • Creating and editing roles
      • SSO settings
        • GitLab SSO
        • Microsoft SSO
        • Okta SSO
      • Scanner settings
        • Auto Closer
        • Group findings by
        • Custom Jira description
        • Custom severity mapping
        • Auditor Job Config
      • Notification settings
        • Integration
        • Criteria & Schedule
        • Status change notification
        • Manage notification schedule
      • Repository Link Configs
      • CWE list
      • Tag screen
    • 🗒️Release notes
  • To be described
    • Documentation backlog
Powered by GitBook
On this page

Was this helpful?

  1. AppSec Portal
  2. General Portal settings
  3. SSO settings

Microsoft SSO

PreviousGitLab SSONextOkta SSO

Last updated 1 year ago

Was this helpful?

The following steps describe the state of Microsoft services at the time of creating this instruction (16/01/2024). The Microsoft identity platform interface may change, so for the most up-to-date information, refer to the official and their official

To log in to the AppSec portal through your Microsoft identity platform, follow these steps:

  1. Navigate to your Microsoft Entra using the

  2. Navigate to Application -> App registrations section and register a new application

  1. You will see the following screen, where you need to copy the <Application (client) ID>:

  1. Now create a client secret on the "Certificates & secrets" tab:

  1. The final data you have to get here is the server metadata url.

  • Domain: login.microsoftonline.com

  • Client ID: <Application (client) ID>

  • Client Secret: <Value>

  • Server metadata url: <OpenID Connect metadata document>

MS Role Mapping

To create a role mapping in our portal, follow these steps:

  1. Create custom roles for Application

Navigate to Applications -> App registrations -> <Created application> -> App roles section and create all required roles here

  1. Now you will be able to assign users/groups to Application roles

For example select a group with all colleagues from IT department and assign them to our newly created role

  1. If a mapping has not been previously configured, the first time you log in using Single Sign-On (SSO), the SSO settings will display a list of roles received from Microsoft under the name External Group Name. You can configure these roles by creating mappings. To do this, add the corresponding portal roles for each group from this list.

If new roles appear on the Microsoft's side, they will also appear as unassociated during the first login and you should associate them later.

Use the data created for your application to SSO integration in the AppSec portal:

the mapping of roles for your SSO connection. JSON key in JWT token with list of external groups field should equal to roles for this integration.

The integration only works with the roles value We know that Microsoft provides the guide with a clearly displayed "groups" key 🤷‍♂️ Get more information about this specific feature from the

🖥️
🛠️
configure
video
source
video guide
link
Client ID
Client Secret
Server metadata url
Microsoft SSO values example
Configure