Skip to content
English
  • There are no suggestions because the search field is empty.

Onboarding Users onto Dune Security from Microsoft Entra ID

Complete app registration, SSO setup, and SCIM provisioning.

This guide provides a comprehensive walkthrough for integrating Dune Security with Microsoft Entra, enabling streamlined user onboarding and robust identity management. Follow these steps to ensure a smooth and effective integration.

 

Overview

Integrating Dune Security with Microsoft Entra allows you to manage user identities seamlessly, supporting automated provisioning, single sign-on (SSO), and enhanced security controls.

 

Pre-Implementation Requirements

Before starting the onboarding process, ensure you have:
  1. Admin access to your Microsoft Entra tenant.
  2. Admin access to your Dune Security account.

 

Step-by-Step Guide to Onboarding Users

1. Access the Azure Portal:
  • Go to Azure Portal.
  • Under "Azure services," select Microsoft Entra ID.
2. Create a New Enterprise Application:
  • In the side navigation panel, under the Manage section, select Enterprise applications.
  • Click New Application and then Create your own application.
  • Enter Dune Security as the application name and click Create.
3. Assign Users and Groups:
  • Once the application is created, go to the Getting Started section.
  • Select Assign users and groups and add the users/groups who need access.
4. Configure Single Sign-On (SSO):
  • Under Manage, select Single sign-on.
  • In a separate window, sign in to your Dune Security admin account via Dune Security Login and navigate to SSO Settings.
  • In the Azure portal, select SAML as the single sign-on method.
5. Complete Basic SAML Configuration:
  • Use the following values provided by Dune Security:
    • Identifier (Entity ID): Copy from the Dune Security platform under "Application Details."
    • Reply URL (Assertion Consumer Service URL): Copy from "Application Details."
6. Add SAML Certificates:
  • Copy the App Federation Metadata URL from the Azure portal.
  • Paste it into the Dune Security platform under Identity Provider Details, and add your email domains.
  • Click Submit on the Dune Security platform.
7. Set Up SCIM Provisioning:
  • In the Azure portal, go to Provisioning and click Get started.
  • Set Provisioning Mode to Automatic.
  • Enter the following Admin Credentials:
  • Click Test Connection. If successful, click Save.
8. Start Provisioning:
  • Click Start provisioning in the Azure portal. If this option is grayed out, click Restart provisioning.
  • Review the Provisioning logs to confirm that everything is functioning correctly.

Post-Setup Verification

1. Test SSO Login:
  • Ensure users can log in to Dune Security using Microsoft Entra SSO by navigating to the Dune Security login page and selecting the Microsoft Entra SSO option.
2. Verify User Provisioning:
  • Check the Dune Security admin console to ensure users and groups from Microsoft Entra are correctly provisioned.
3. Monitor and Troubleshoot:
  • Regularly monitor the integration logs in both Microsoft Entra and Dune Security for any issues or errors.
  • Contact Dune Security Support for any assistance or troubleshooting needs.

Next Steps

You're almost there! Before launching your Baseline Risk Assessment, you'll need to ensure emails are delivered seamlessly to your users' inboxes: Ensuring Email Deliverability on Microsoft 365.
 

Support and Assistance

For any issues during the integration process or further assistance, please contact Dune Security Support: support@dune.security
 
By following these steps, you can successfully integrate Microsoft Entra with Dune Security, ensuring streamlined user onboarding and enhanced security for your organization.