Single Sign On through Azure AD (Entra) allows your organization to integrate authentication to Mimecast with Azure. This fully supports all Microsoft authentication functions, such as Multi-Factor Authentication and Integrated Authentication, Azure AD Seamless SSO, and Conditional Access. In addition, you can also configure Azure SSO to work with the Mimecast Personal Portal.
The Azure application belongs to a third-party software vendor. Therefore, alert us using the feedback function in this article when changes are made to the Azure application, and the user interface does not correlate with the instructions and screenshots below.
Considerations
- Mimecast Single Sign-On through Office Azure uses the mail attribute as the primary SMTP address in Azure AD to identify users. This will accommodate your users with a different User Principal Name (UPN).
- The end-user experience when accessing Mimecast Services:
-
- End users can access Mimecast Services using the Mimecast website or by bookmarking in their browser via a Service Provider (SP) Initiated Login.
- End users can access Mimecast Services via the Azure MyApps Portal and Identity Provider (IDP) Logins.
- The end-user's Email address must be entered under their Contact Information in Azure for SAML to work correctly.
This is important because Azure currently supports both SP and IDP logins. You will have to choose the best login method for your organization.
- Do you have Azure Premium?
-
- Azure Premium will enable you to build custom Enterprise Apps with more control if you restrict access to a specific Mimecast Service. (This can also be controlled within the Mimecast Administration Console).
- Azure Premium enables you to build Applications in the Azure MyApps Portal (Identity Provider Logins). See How to Configure SSO SP/IDP-Initiated logins using Azure Premium when using Azure Premium.
By default, it is listed as Mimecast.
Conditional Access is not supported on Mimecast Mobile. For more information, see Single Sign-On - Jul 2024
Configuring SSO SP-Initiated Logins using Azure Standard
You can configure SSO SP-initiated logins using Azure Standard by using the following steps:
- Log in to your Azure Administrator Portal.
- Navigate to Azure Active Directory | Enterprise Applications | New Application.
- Search for Mimecast in the Search application textbox.
-
Select the Mimecast Application.
Please do not use any other Applications, as they will not work with Mimecast.
- On the pop-up Panel, give the SSO Application a Name.
By default, it is listed as Mimecast.
- Click on Create.
- Select Properties from the Manage section. Make sure:
-
- Enabled for users to sign in is set to Yes.
- The user assignment required is set to No.
- Visible to users is set to No.
- Click on Save.
- Select Single Sign-On from the Manage section.
- Select SAML as the Single Sign-On method.
- Click the Edit icon
in the top corner of the Basic SAML Configuration Box.
- Delete all the values in the Identifier (Entity ID) field by clicking the trashcan icon
next to each URL.
- In the Identifier (Entity ID) field, enter the value for your region from the table below.
The values entered depend on the Mimecast grid where your organization's Mimecast account is hosted. Replace ACCOUNTCODE with your unique Mimecast Account Code. Found by navigating to Account | Account Settings on the Mimecast Administration Console.
|
Region |
Azure AD Value |
|---|---|
|
Europe (Excluding Germany) |
https://eu-api.mimecast.com/sso/ACCOUNTCODE |
|
Germany |
https://de-api.mimecast.com/sso/ACCOUNTCODE |
|
United States of America |
https://us-api.mimecast.com/sso/ACCOUNTCODE |
|
United States of America (USB) |
https://usb-api.mimecast.com/sso/ACCOUNTCODE |
|
Canada |
https://ca-api.mimecast.com/sso/ACCOUNTCODE |
|
South Africa |
https://za-api.mimecast.com/sso/ACCOUNTCODE |
|
Australia |
https://au-api.mimecast.com/sso/ACCOUNTCODE |
|
Offshore |
https://jer-api.mimecast.com/sso/ACCOUNTCODE |
|
USPCOM |
https://uspcom-api.mimecast-pscom-us.com/sso/ACCOUNTCODE |
- Insert the link for your region from the chart below into the Reply URL (Assertion Consumer Service URL) and Sign-on URL boxes.
|
Region |
Service Provider Initiated |
|---|---|
|
Europe (Excluding Germany) |
https://eu-api.mimecast.com/login/saml |
|
Germany |
https://de-api.mimecast.com/login/saml |
|
United States of America |
https://us-api.mimecast.com/login/saml |
|
United States of America (USB) |
https://usb-api.mimecast.com/login/saml |
|
Canada |
https://ca-api.mimecast.com/login/saml |
|
South Africa |
https://za-api.mimecast.com/login/saml |
|
Australia |
https://au-api.mimecast.com/login/saml |
|
Offshore |
https://jer-api.mimecast.com/login/saml |
|
USPCOM |
https://uspcom-api.mimecast-pscom-us.com/login/saml |
- Click on Save in the top left corner of the Panel.
- Click Close to close the Panel and return to the main menu.
- Click on Edit in the User Attributes & Claims panel.
- Click on the Value user.userprincipalname.
- Select user.mail as the Source Attribute in the Manage claim panel.
- In the choose name identifier format drop-down, select Email address if it has not been selected already.
- Click on Save at the top of the Panel and close it.
- Copy the App Federation Metadata URL from the SAML Signing Certificate panel.
- Log in to the Mimecast Administration Console.
- Navigate to Users & Groups | Applications | Authentication Profiles.
- Click the Authentication Profile to which you want to add SSO or create a New Authentication Profile.
- Choose the Mimecast Application you want to use SSO and check the Enforce SAML Authentication Box for that app.
- The steps below will be the same for all the applications. Repeat for any other application you would like to use SSO on.
Complete as follows:
|
Field / Option |
Setting |
|---|---|
|
Enforce SAML Authentication for Administration Console
|
Check the checkbox.
|
|
Provider
|
Select Azure Active Directory.
|
|
Metadata URL
|
Paste the App Metadata URL into the Metadata URL textbox. Click Import.
The application will refresh, and fields from your SSO application will auto-populate. |
|
Monitor Metadata URL
|
Check the checkbox.
|
|
Allow Single Sign On
|
Check the checkbox.
|
|
Use Password Protected Context
|
Uncheck the checkbox.
|
|
Use Integrated Authentication Context
|
Uncheck the checkbox.
|
-
Click on Save and Exit.
Comments
Please sign in to leave a comment.