Authentication Profiles - Azure Standard SSO Configuration

Single Sign On through Azure AD (Entra) allows your organization to integrate authentication to Mimecast with Azure. This fully supports all Microsoft authentication functions, such as Multi-Factor Authentication and Integrated Authentication, Azure AD Seamless SSO, and Conditional Access. In addition, you can also configure Azure SSO to work with the Mimecast Personal Portal.

The Azure application belongs to a third-party software vendor. Therefore, alert us using the feedback function in this article when changes are made to the Azure application, and the user interface does not correlate with the instructions and screenshots below.

Considerations

  1. Mimecast Single Sign-On through Office Azure uses the mail attribute as the primary SMTP address in Azure AD to identify users. This will accommodate your users with a different User Principal Name (UPN).
  2. The end-user experience when accessing Mimecast Services:
    • End users can access Mimecast Services using the Mimecast website or by bookmarking in their browser via a Service Provider (SP) Initiated Login.
    • End users can access Mimecast Services via the Azure MyApps Portal and Identity Provider (IDP) Logins.
  1. The end-user's Email address must be entered under their Contact Information in Azure for SAML to work correctly.

This is important because Azure currently supports both SP and IDP logins. You will have to choose the best login method for your organization.

  1. Do you have Azure Premium?
    • Azure Premium will enable you to build custom Enterprise Apps with more control if you restrict access to a specific Mimecast Service. (This can also be controlled within the Mimecast Administration Console).
    • Azure Premium enables you to build Applications in the Azure MyApps Portal (Identity Provider Logins). See How to Configure SSO SP/IDP-Initiated logins using Azure Premium when using Azure Premium.

By default, it is listed as Mimecast.

Conditional Access is not supported on Mimecast Mobile. For more information, see Single Sign-On - Jul 2024

Configuring SSO SP-Initiated Logins using Azure Standard

You can configure SSO SP-initiated logins using Azure Standard by using the following steps:

  1. Log in to your Azure Administrator Portal.
  2. Navigate to Azure Active Directory | Enterprise Applications | New Application.
  3. Search for Mimecast in the Search application textbox.
  4. Select the Mimecast Application.

    Please do not use any other Applications, as they will not work with Mimecast.

  5. On the pop-up Panel, give the SSO Application a Name.

By default, it is listed as Mimecast.

  1. Click on Create.
  2. Select Properties from the Manage section. Make sure:
    • Enabled for users to sign in is set to Yes.
    • The user assignment required is set to No.
    • Visible to users is set to No.
  1. Click on Save.
  2. Select Single Sign-On from the Manage section.
  3. Select SAML as the Single Sign-On method.
  4. Click the Edit icon Edit Basic SAML Configuration in the top corner of the Basic SAML Configuration Box.
  5. Delete all the values in the Identifier (Entity ID) field by clicking the trashcan icon Delete Identifier (Entity ID) next to each URL.
  6. In the Identifier (Entity ID) field, enter the value for your region from the table below.

The values entered depend on the Mimecast grid where your organization's Mimecast account is hosted. Replace ACCOUNTCODE with your unique Mimecast Account Code. Found by navigating to Account | Account Settings on the Mimecast Administration Console.  

Region

Azure AD Value

Europe (Excluding Germany)

https://eu-api.mimecast.com/sso/ACCOUNTCODE

Germany

https://de-api.mimecast.com/sso/ACCOUNTCODE

United States of America

https://us-api.mimecast.com/sso/ACCOUNTCODE

United States of America (USB) 

https://usb-api.mimecast.com/sso/ACCOUNTCODE

Canada

https://ca-api.mimecast.com/sso/ACCOUNTCODE

South Africa

https://za-api.mimecast.com/sso/ACCOUNTCODE

Australia

https://au-api.mimecast.com/sso/ACCOUNTCODE

Offshore

https://jer-api.mimecast.com/sso/ACCOUNTCODE

USPCOM

https://uspcom-api.mimecast-pscom-us.com/sso/ACCOUNTCODE

  1. Insert the link for your region from the chart below into the Reply URL (Assertion Consumer Service URL) and Sign-on URL boxes.

Region

Service Provider Initiated

Europe (Excluding Germany)

https://eu-api.mimecast.com/login/saml

Germany

https://de-api.mimecast.com/login/saml

United States of America

https://us-api.mimecast.com/login/saml

United States of America (USB) 

https://usb-api.mimecast.com/login/saml

Canada

https://ca-api.mimecast.com/login/saml

South Africa

https://za-api.mimecast.com/login/saml

Australia

https://au-api.mimecast.com/login/saml

Offshore

https://jer-api.mimecast.com/login/saml

USPCOM

https://uspcom-api.mimecast-pscom-us.com/login/saml

  1. Click on Save in the top left corner of the Panel.
  2. Click Close to close the Panel and return to the main menu.
  3. Click on Edit in the User Attributes & Claims panel.
  4. Click on the Value user.userprincipalname.
  5. Select user.mail as the Source Attribute in the Manage claim panel.
  6. In the choose name identifier format drop-down, select Email address if it has not been selected already.
  7. Click on Save at the top of the Panel and close it.
  8. Copy the App Federation Metadata URL from the SAML Signing Certificate panel.
  9. Log in to the Mimecast Administration Console.
  10. Navigate to Users & Groups | Applications | Authentication Profiles.
  11. Click the Authentication Profile to which you want to add SSO or create a New Authentication Profile.
  12. Choose the Mimecast Application you want to use SSO and check the Enforce SAML Authentication Box for that app.
  13. The steps below will be the same for all the applications. Repeat for any other application you would like to use SSO on.

Complete as follows:

 

Field / Option

Setting

Enforce SAML Authentication for Administration Console
Check the checkbox.
Provider
Select Azure Active Directory.
Metadata URL
Paste the App Metadata URL into the Metadata URL textbox. Click Import.
The application will refresh, and fields from your SSO application will auto-populate.
Monitor Metadata URL
Check the checkbox.
Allow Single Sign On
Check the checkbox.
Use Password Protected Context
Uncheck the checkbox.
Use Integrated Authentication Context
Uncheck the checkbox.
  1. Click on Save and Exit.

See Also...

Was this article helpful?
4 out of 6 found this helpful

Comments

0 comments

Please sign in to leave a comment.