Configure SAML with Azure AD

You can configure Google Threat Intelligence to use SAML with Azure AD Identity Idp. These are the recommended steps for this set-up.

Configuring the Azure Application

1. Azure application

In your Azure portal, search for Enterprise Applications.

Azure Enterprise Applications

Press the "Create a new application" button.

Create new application on azure

2. Application configuration

Provide a name to the new application (as an example, VirusTotalSSO).

Select the "Integrate any other application you don’t find in the gallery (Non-gallery)" option.

Press the "Create" button at the bottom in order to create the instance of the new application.

Configure application on azure

3. Single sign on setup

On the "Overview" tab of the new application, press the "Set up single sign on" button.

Set up Single Sign on

Select the "SAML" option.

Single sign on methods

4. SAML configuration

On the SAML setup, select "Basic SAML configuration" and press "Edit" button.

Basic SAML configuration

Press "Add identifier" in order to configure the Entity ID. The Entity ID must be the same as the Audience in the VirusTotal SAML configuration on the group page. Choose a unique string as an example, VirusTotal_group_id_SSO.

Press "Add reply URL" in order to configure the Reply URL. The Reply URL must be https://virustotalcloud.firebaseapp.com/__/auth/handler.

Basic SAML configuration edition

Press "Save" in order to save the changes.

⚠️

Note that both Entity ID and Reply URL are mandatory.

Saved options

4. Required data

ℹ️

Check those fields on the image at the bottom of the section.

SAML certificate

Download the certificate from the "SAML Certificate" section.

⚠️

Use the base64 format to download the certificate.

Login URL

Copy the Login URL from the "Setup VirusTotalSSO" section.

Azure AD identifier

Copy the Azure AD Identifier from the "Setup VirusTotalSSO" section.

Parameters to be used on the Google TI group settings page

Configuring the SSO in VirusTotal

1. Group settings page

Open your group settings page: https://www.virustotal.com/gui/group/<group_id>/settings

ℹ️

Note that only Group admin are able to see the settings page.

On "Single sign-on" section select the Other (SAML) option in "Identity provider" dropdown.

Available SSO options

⚠️

Do NOT enable the "All my group users must mandatorily sign in using this identity provider" until you've fully confirmed your SAML configuration is working and your organization can successfully sign in.
Enabling this setting with an incorrect configuration could lock all your users out of the platform.

Enforce SAML checkbox

2. Required fields

Include the information provided by the Azure application on the different fields:

Identity provider issuer

Add the Azure AD identifier provided in step 4: Required data.

Identity provider single sign-on URL

Add the Login URL provided in step 4: Required data.

Audience

Add the Entity ID used on step 3: Configure SAML. In our example, the value "VirusTotal_group_id_SSO".

X.509 certificate

Add the content of the downloaded certicate in step 4: Required data.

Fields on group settings page

Save your SSO settings to activate SAML.

3. Sign-in URL

The Sign-in URL will appear once the settings are saved.

ℹ️

Share this Sign-in URL with your group members so they can authenticate on the platform using SSO.

Sign in URL

Manage user access to Google TI on Azure AD platform

Open the application you previously created within Azure AD.

Navigate to the "Users and Groups" section. Here, you can manage which users will have access to the Google TI platform via SSO.

ℹ️

Once you've confirmed that everything is working correctly, you can enforce SSO authentication for your group selecting the "All my group users must mandatorily sign in using this identity provider" option on the group settings page.