Onboarding and Self-Service


Microsoft Azure Federated Authentication

Updated Feb 21, 2024

Configure Azure federated authentication for Arctic Wolf web portals

You can configure Azure® as a Federated Identity Management (FIM) source for Arctic Wolf® web portals.

Steps

  1. Register the application.
  2. Configure the application.
  3. Create the client secret.
  4. Get the OpenID Connect metadata document URL.
  5. Register your IdP with Arctic Wolf.

Step 1: Register the application

  1. Sign in to the Azure portal.
  2. In the search bar, enter Microsoft Entra ID.
  3. In the search results, select Microsoft Entra ID.
  4. In the navigation menu, in the Manage section, click App registrations.
  5. Click New registration, and then configure these settings:
    • Name — Enter a descriptive name. For example, MDR Dashboard.
    • Supported account type — Select the Accounts in this organizational directory only (Default Directory only - Single tenant) option.
    • Redirect URI — Select Web.
    • Redirect URI — Enter https://auth.arcticwolf.com/login/callback.
  6. Click Register.
  7. Copy the Application (client) ID value, and then save it in a safe, encrypted location. You will provide it to Arctic Wolf later.

Step 2: Configure the application

  1. In the navigation menu, in the Manage section, click Authentication.
  2. In the Implicit grant section, select the ID tokens checkbox, and then click Save.
  3. In the navigation menu, in the Manage section, select Manifest.
  4. Change the accessTokenAcceptedVersion value from null to 2, and then click Save.
  5. In the navigation menu, in the Manage section, click API permissions
  6. On the API Permissions page, complete these steps:
    1. Click + Add a permission.

    2. Click Microsoft Graph.

    3. Click Delegated permissions.

    4. Select the openid checkbox, and then click Add permissions.

    5. (Optional) Click Grant admin consent for Default Directory.

      Note: If you do not consent, each user is asked to consent when they first sign in.

Step 3: Create the client secret

  1. In the navigation menu, in the Manage section, click Certificates & secrets.

  2. Click New client Secret, and then configure these settings:

    • Description — Enter a description for the client secret.

    • Expires — Select the time during which this secret is valid.

      Tip: Arctic Wolf recommends setting this value to 24 months to prevent issues with an expired secret.

  3. Click Add.

  4. In the Value field, click Copy to clipboard, and then save the client secret in a safe, encrypted location. You will provide it to Arctic Wolf later.

    Note: The client secret is only available during this step. If this information is lost before you submit it to Arctic Wolf, you must create a new client secret.

Step 4: Get the OpenID Connect metadata document URL

  1. On the Overview page for the application, click Endpoints.

  2. In the OpenID Connect metadata document field, click Copy to clipboard, and then save it in a safe, encrypted location. You will provide it to Arctic Wolf later.

    The URL has this format, where <directory_(tenant)_id> is the directory (tenant) ID of the application that you created: https://login.microsoftonline.com/<directory_(tenant)_id>/v2.0/.well-known/openid-configuration.

  3. Copy the OpenID Connect metadata document value, and then save it in a safe, encrypted location. You will provide it to Arctic Wolf later.

Step 5: Register your Azure account with Arctic Wolf

  1. Sign in to the Arctic Wolf Unified Portal.

  2. Click Telemetry Management > Connected Accounts.

  3. Click Add Account +.

  4. On the Add Account page, in the Account Type list, select Federated Authentication.

  5. Click OpenID Connect.

  6. On the Add Account page, configure these settings:

    • Account Name — Enter a unique and descriptive name for the account. For example, enter Okta SSO or OneLogin ODIC Connector.

    • Issuer URL — Enter the OpenID Connect metadata document URL.

    • Client ID — Enter the IdP-issued client ID.

    • Client Secret — Enter the IdP-issued client secret.

    • Domain Name — Enter your company email domain name.

    • Credential Expiry — (Optional) Enter the credential expiration date, if applicable.

  7. Click Test and Submit Credentials.

    Arctic Wolf automatically receives a ticket to complete the federated authentication setup. You receive a confirmation Zendesk email when the account setup is complete.

See also