End-of-Life (EoL)

Define Azure to authenticate Cortex XSOAR

Follow these instructions to add Cortex XSOAR in Azure.
You need to authenticate Cortex XSOAR for single sign-on section in your Azure environment. Before you start, ensure that you have created a non-gallery application and assigned users, as described in Create a Non-Gallery Application in Azure.
  1. Go to
    Home
    Enterprise applications
    Name of your application
    .
  2. In the
    Set up single sign on
    section, click
    Get started
    .
  3. Click
    SAML
    .
  4. In the
    Basic SAML Configuration
    section, add the
    Identifier (Entity ID)
    and
    Reply URL (Assertion Consumer Service URL)
    .
    Use the format
    https://
    <XSOAR Server FQDN>
    /saml
  5. In the
    User Attributes & Claims
    section, click the edit icon and add the following attributes and values as required.
    Ensure the attribute names match the names in Cortex XSOAR, when defining the instance.
  6. To add a new group, click
    Add a group claim
    .
  7. In the
    Group Claims (Preview)
    window, select
    Security groups
    .
  8. In the
    Advanced options
    section, select the
    Customize the name of the group claim
    check box.
  9. In the
    Name
    field, type
    memberOf
    .
  10. Click
    Save
    .
    Ensure that you have a group assigned to a user in the Cortex XSOAR in Azure.The Object ID is added to the
    SAML Roles Mapping
    field in Cortex XSOAR.
  11. Note the
    App Federation Metadata Url
    and
    Login URL
    , which are needed to configure the instance in Cortex XSOAR.
  12. You can now add an instance in Cortex XSOAR, as described in Configure the SAML 2.0 Integration for Azure.

Recommended For You