Onboarding Users onto Dune Security from Microsoft Entra ID
Complete app registration, SSO setup, and SCIM provisioning.
This guide provides a comprehensive walkthrough for integrating Dune Security with Microsoft Entra, enabling streamlined user onboarding and robust identity management. Follow these steps to ensure a smooth and effective integration.
Overview
Integrating Dune Security with Microsoft Entra allows you to manage user identities seamlessly, supporting automated provisioning, single sign-on (SSO), and enhanced security controls.
Pre-Implementation Requirements
Before starting the onboarding process, ensure you have:
- Admin access to your Microsoft Entra tenant.
- Admin access to your Dune Security account.
Step-by-Step Guide to Onboarding Users
1. Access the Azure Portal:- Go to Azure Portal.
- Under "Azure services," select Microsoft Entra ID.
- In the side navigation panel, under the Manage section, select Enterprise applications.
- Click New Application and then Create your own application.
- Enter Dune Security as the application name and click Create.
- Once the application is created, go to the Getting Started section.
- Select Assign users and groups and add the users/groups who need access.
- Under Manage, select Single sign-on.
- In a separate window, sign in to your Dune Security admin account via Dune Security Login and navigate to SSO Settings.
- In the Azure portal, select SAML as the single sign-on method.
- Use the following values provided by Dune Security:
-
- Identifier (Entity ID): Copy from the Dune Security platform under "Application Details."
- Reply URL (Assertion Consumer Service URL): Copy from "Application Details."
- Set the Sign-on URL to
https://dune.security/login/
.
- Copy the App Federation Metadata URL from the Azure portal.
- Paste it into the Dune Security platform under Identity Provider Details, and add your email domains.
- Click Submit on the Dune Security platform.
- In the Azure portal, go to Provisioning and click Get started.
- Set Provisioning Mode to Automatic.
- Enter the following Admin Credentials:
-
- Tenant URL:
https://auth.dune.security/scim/v2
- Secret Token: Use the token provided from Dune Security under "SCIM Provisioning Details."
- Tenant URL:
- Click Test Connection. If successful, click Save.
- Click Start provisioning in the Azure portal. If this option is grayed out, click Restart provisioning.
- Review the Provisioning logs to confirm that everything is functioning correctly.
Post-Setup Verification
1. Test SSO Login:- Ensure users can log in to Dune Security using Microsoft Entra SSO by navigating to the Dune Security login page and selecting the Microsoft Entra SSO option.
- Check the Dune Security admin console to ensure users and groups from Microsoft Entra are correctly provisioned.
- Regularly monitor the integration logs in both Microsoft Entra and Dune Security for any issues or errors.
- Contact Dune Security Support for any assistance or troubleshooting needs.
Next Steps
You're almost there! Before launching your Baseline Risk Assessment, you'll need to ensure emails are delivered seamlessly to your users' inboxes: Ensuring Email Deliverability on Microsoft 365.
Support and Assistance
For any issues during the integration process or further assistance, please contact Dune Security Support: support@dune.security
By following these steps, you can successfully integrate Microsoft Entra with Dune Security, ensuring streamlined user onboarding and enhanced security for your organization.