Appendix
Appendix I - MS Entra configuration
Steps to follow within Apptio Domain Management:
- Navigate to Domain Management, ensure your authentication domain is selected at the top, select Export SAML Metadata
Steps to follow within Microsoft Entra Portal:
- Go to Azure portal and select Enterprise Applications .
- Select New Application then Create your own application .
- Enter name for your app, which is appeared for end users, for example "Apptio".
- Chose Integrate any other application you don't find in the gallery (Non-gallery) from What are you looking to do with your application? . Do not use a gallery application.
- After the application is successfully added, you will be redirected to its Overview page.
- Assign the required users and/or groups that should have access to this application.If you
prefer to access your application by all users, navigate to properties from left hand panel and
toggle Assignment Required to No , then Save .
- Note that authorization is not automatically granted to users unless auto-provision for users is enabled from Apptio Domain Management or if the users are actively assigned a role within Apptio Access Administration.
- Navigate to Single sign-on from the left-hand pane.
- Select SAML from single sign-on method .
- Select Upload metadata file and upload the SAML metadata file downloaded from Frontdoor Domain Management (step 1).
- Basic SAML Configuration module will be displayed after SAML file is uploaded successfully. Select Save .
- Select Edit next to Attribute & Claims section after initial single sign-on configuration is saved successfully.
- Select Add new claim from the Attributes & Claims page.
- Enter displayname as name.
- Select user.displayname as source attribute and then Save. This new claim will be the user's full name.
- After saving, return to SAML-based Sign-on page for this enterprise application.
- From the SAML Certificates section, Download the Federation Metadata XML file
and save a copy of this file to later be uploaded to Apptio Domain Management .
Return to Apptio Domain Management to complete Configuring SSO Connections .
- If your SAML attribute name follows a URL format, as http://schemas.microsoft.com/identity/claims/displayname, specify the value after the final /, such as 'displayname' in this example.
Note:
Here, Domain Managment maps incoming IdP attribute name http://schemas.microsoft.com/ws/2008/06/identity/claims/role to groupids as shown in the table below (groupIds is also acceptable)
|
Equivalent attribute name to input in Domain Management connection |
Microsoft Entra SAML assertion attribute name |
|---|---|
| displayname | http://schemas.microsoft.com/identity/claims/displayname |
| emailaddress | http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress |
| groupIds | http://schemas.microsoft.com/ws/2008/06/identity/claims/role |