Configuring SAML Microsoft Cloud App Security


This knowledge base article describes how to configure Microsoft Cloud App Security (MCAS) to connect to OneLogin via SAML.

Questions to ask yourself before you start this process:

Salesforce

  1. Log into Salesforce as an admin, then go to Settings > Identity > Single Sign-on Settings.
  2. Copy your Salesforce assertion consumer service URL, then paste it somewhere safe for later retrieval.

OneLogin

  1. Navigate to Administration > Applications > Applications, click the Add App button, and search for SAML Test Connector (Advanced).
  2. Select the app and name it Salesforce via MCAS, then change the icon if you wish (noting that end users will see it) and click Save.

  1. Click the SSO tab and copy the Issuer URL, then click More Actions and download the SAML Metadata file for later use.

Cloud App Security Portal

  1. Open your Microsoft Cloud App Security Portal and navigate to Investigate > Connected App > Conditional Access App Control Apps, then click Add and select the application you would like to connect - in this example, Salesforce.

  1. Click Next > Next, then upload the metadata that you downloaded from OneLogin in the previous step. Click Next.

  1. Copy the McasSigninigCert, McasAppId, and Single Sign On URL and paste them someplace safe for later retrieval, then click Next.

  1. Copy the SAML Sign On URL and paste it someplace safe for later retrieval. It will be used as the Identity Provider Login URL in Salesforce.

  1. Download the Cloud App Security SAML Certificate.

Salesforce

  1. Log into Salesforce as an admin, then go to Settings > Identity > Single Sign-on Settings.
  2. Configure the settings as follows:
Name OneLogin via Microsoft CAS
Issuer URL The Issuer URL from OneLogin
Identity Provider Login URL The SAML Sign On URL from MCAS
Entity ID https://saml.salesforce.com
Identity Provider Certificate Upload the certificate you downloaded from MCAS in the previous step.
  1. Click Save.

OneLogin

  1. Switch back to your OneLogin admin console and navigate to Configuration, then enter the following values and click Save:

  1. Navigate to Parameters and click the plus sign to design a new parameter.
  2. Name the parameter McasSigningCert, then choose Macro and paste the McasSigningCert value you copied earlier. Click the Include in SAML Assertion box, then click Save.

  1. Click the plus sign again.
  2. Name the parameter McasAppId, then choose Macro and paste the McasAppId value you copied earlier. Click the Include in SAML Assertion box, then click Save.

Once they complete your setup, you can test your connection.