You can integrate Bridgecrew Cloud with Azure AD to enable single sign-on for your organization's users. In parallel, invite users and set their permissions from the User Management page. You can choose either one of these methods for assigning permissions (but not both):
(a) Map Azure AD groups to Bridgecrew permissions (roles and accounts)
(b) Set permissions per user from within Bridgecrew's User Management page.
This feature enables SSO access; in parallel, each user must be added to Bridgecrew Cloud, here.
- In the Azure AD console, create an Enterprise Application.
From Single Sign-On, choose SAML.
Edit the basic SAML configuration:
- Entity ID:
- Reply URL:
- Sign on URL: the URL for the sign on login page (from the SSO integration summary in the Identity provider tab within the integrations screen)
- User Attributes & Claims
a. Edit Unique User Identifier (Name ID):
b. Create new optional claim and configure as shown below:
c. For group mapping, create a Group Claim and configure as shown below:
When you integrate Bridgecrew Cloud with Azure AD you first enable SSO access and then set permissions either manually, per user, within Bridgecrew, or by mapping Azure AD groups to Bridgecrew permissions.
- Under Integrations, select Identity Provider from SSO.
- Select ADD SSO and then Azure AD.
- Enter the email domain.
- Upload the metadata XML file.
Next you will either:
- Enable & Configure Group Role Mapping
- Assign User Permissions Manually
Each Azure AD group can be mapped to a Bridgecrew role and a list of permitted accounts.
- On the lower half of the Azure AD integration page enter the name of an Azure AD group. Use Add to add a row for each group you want to map.
- Select a Bridgecrew role (see Roles for precise definitions).
- Select one or more permitted accounts.
- You can use a single entry to associate multiple groups with a set of permissions (Role and permitted accounts). To do so, add the group names under Azure AD Group, separated by comma.
- If you mistakenly enter the name of a group twice - once with lower and once with higher permissions - the higher level permissions is applied.
- Only member of an Azure AD group are able to access Bridgcrew Cloud (and not nested groups).
- Any permissions previously set manually are overridden by the Azure AD group settings.
- At any time, you can disable Azure AD mapping and set permissions manually instead.
- Under Settings, select User Management.
- Press Edit for a user.
- Set the user's role and permitted accounts.
- Press Save Changes.
After integrating with ADFS and assigning permissions (either manually or by group mapping), you can fetch the login URL.
1.. Select Show Details.
2 . Select Copy Login URL.
Sharing the Login URL
Bridgecrew is now integrated with ADFS.
Share the login URL with relevant users.
Updated 4 months ago