Description
Microsoft 365 Single Sign-On (SSO) allows your users to log in to the Breach Secure Now portal using their Microsoft credentials. This way, users no longer need to worry about remembering their password for their Breach Secure Now account, and the login process is as easy as entering their email address, to be directed to verification. This guide covers how Partner Administrators can configure SAML-based SSO through Microsoft Entra Admin Center.
Requirements
Administrator access to the Breach Secure Now Portal
Administrator access to the Microsoft Entra portal.
The Process
Step 1 – Access the Client View
- Log in to the Breach Secure Now portal as a Partner Administrator.
- Click Manage Clients to view your client list.
- Select the client you want to enable Microsoft 365 SSO for.
Step 2 – Open SSO Settings in Breach Secure Now
- Go to the User Management tab.
- Click the Single Sign-On button.
- Click the Microsoft logo to start SSO configuration.
Note: Keep this page open — you will need the Application ID URL and Redirect URL for later steps in Entra Admin Center.
Step 3 – Create an Application in Microsoft Entra Admin Center
- In a new tab, go to Microsoft Entra Admin Center.
- Navigate to Enterprise applications.
- Click New application.
- Select Create your own application, enter a name (e.g., “BSN SSO”), choose Integrate any other application you don’t find in the gallery (Non-gallery), then click Create.
Step 4 – Configure SAML Settings in Entra
- In the new application, go to Single sign-on and select SAML.
- In Breach Secure Now, copy the Application ID URL and Redirect URL.
- In Entra, under Basic SAML Configuration, click Edit.
- Click Add identifier and paste the Application ID URL.
- Click Add reply URL and paste the Redirect URL.
- Click Save, then close the configuration window.
Step 5 – Add Email Claim
- In Attributes & Claims, click Edit.
- Click Add new claim and fill in the following:
- Name: Email
- Namespace: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress
- Source: Attribute
- Source attribute: user.mail
Click Save, then close the Attributes & Claims window.
*Optional: If you are running into a situation where you are trying to enable SSO and a client has a UPN focused sync, you can use this set up to enable UPN instead of email.
"When creating the custom Email claim, set its attribute to user.userprincipalname. Additionally, update the default preconfigured claim emailaddress so that it also maps to user.userprincipalname."
Step 6 – Get Metadata URL and Complete Setup
- Back in Entra, within the Properties section, change the Assignment required? option to No and click Save.
- In SAML Certificates, copy the App Federation Metadata URL.
- Return to the Breach Secure Now portal and paste the Metadata URL into the SSO configuration.
Optional: Enable Skip Identity Provider Logout if you want users to remain logged into Microsoft 365 after logging out of Breach Secure Now.
Step 7 – Grant Permissions and Test Login
- If required, provide consent for the SSO application to be enforced across the account.
- Log out of Breach Secure Now and log back in with a client user account where SSO was configured.
- If prompted by Microsoft, check Consent on behalf of your organization and click Accept.
You have now successfully set up Microsoft 365 Single Sign-On for your client in the Breach Secure Now portal.