Single Sign-On with Entra ID
Overview
This step-by-step guide explains how to set up Single Sign-On in CodeScan with Microsoft Entra ID [formerly Azure Active Directory (AD)] as your SAML 2.0 Identity Provider (IdP). This enables users to restrict login IPs via SSO.
When you integrate CodeScan with Entra ID, you can:
Control in Entra ID who has access to CodeScan.
Enable your users to be automatically signed in to CodeScan with their Entra ID accounts.
Manage your accounts in one central location: the Azure portal.
Prerequisites
To get started, you need the following items:
Microsoft Azure account with Entra ID activated.
Administrator-level access to CodeScan and Entra ID to configure SSO.
Enable Single Sign-On (SSO) in CodeScan.
Add CodeScan as a non-gallery application in Azure.
Instructions
Step 1: Enabling Single Sign-On in CodeScan
Before configuring SSO in Entra ID, you must enable SSO in CodeScan.
In CodeScan, click on the
Profileicon on the right corner of the screen and select your organization (underMy Organizations).Go to
Administration > SAML Connections.Click on
Create Connection.In the
Connection namefield, enter the identity provider name as you want it to appear (use only Latin characters without spaces and any special characters).Enter a valid domain name of the organization in the
Corporate domainfield that can be authenticated in the Identity Provider. This property cannot be updated after SAML Connection creation. Example: In case of[email protected],the corporate domain will beautorabit.com.Keep the
Enforce SSOcheckbox unchecked for now. You can enable Enforce SSO later when your domain has been confirmed. Once enabled, only SSO authentication will be allowed for email addresses of your corporate domain.Point to Note:
Enforcing SSO affects both login and signup. Existing Auth0 users won't be able to login.
Signup with email domain same as corporate domain won't be allowed.
If the
Enforce SSOcheckbox is enabled prematurely, it will prohibit all users in their organization from accessing CodeScan. Consider enforcing SSO only after admins have logged in to CodeScan using SSO.
Keep the
SAML Connection statuscheckbox asEnabledand click onCreatebutton.You will be able to see the
Metadata URLgenerated for your SSO configuration. Keep the current page open while you continue to add the CodeScan app to Entra ID.
Step 2: Configuring Azure Portal with Entra ID
Log in to the Azure portal (https://portal.azure.com/). In the left-hand menu, click
Entra ID > Enterprise applications.Select
All applicationsunder theManagesection.Click
+ New applicationat the top of the screen.On the next screen, click on the
+ Create your own applicationbutton.Enter the name of the app as
CODESCANand choose the third option i.e.,Integrate any other application you don't find in the gallery (Non-gallery). ClickCreate.Once the CodeScan application is created, click on
Single Sign-Onunder theManagesection.

On the
Select a Single Sign-On methoddialog, selectSAMLmode to enable single sign-on.

On the
Set up Single Sign-On with SAMLpage, click theEdit (pencil)icon forBasic SAML Configurationto edit the settings.

On the
Basic SAML Configurationsection, perform the following steps:In the
Identifier (Entity ID)field, enter theconnection_idin this field.In the
Reply URLfield, enter theURLin the below format:{instanceurl}/_codescan/login/saml2/sso/{connection_id}Click
Saveand close the dialog box.
Click the
Edit (pencil)icon forAttributes & Claimsto edit the attributes settings.On the
Attributes & Claimssection, delete the auto-generated claims available in theAdditional claimssection.

Next, click on
+ Add New Claim.

In the
Manage Claimpage, fill in the below details:
saml_email
Attribute
user.mail
Click
Save.Follow similar steps to add two more claims as mentioned in the following table:
saml_username
Attribute
user.mail
saml_name
Attribute
user.displayname

Close the dialog box and navigate to
Users and groupssection. Click on+ Add user/groupbutton to assign users and groups to app-roles for the CodeScan application.Click on
Single sign-onto navigate back to theSet up Single Sign-On with SAMLpage.In the
SAML Certificatesection, findCertificate (Base64)and selectDownloadto download the certificate and save it on your computer.
In the
SAML Certificatesection, findFederation Metadata XMLand selectDownloadto download the certificate and save it on your computer.
Step 3: Configuring in CodeScan SAML Connection
Now that your Azure SSO implementation is set up, you’ll need to follow just a few more steps to configure SSO in your CodeScan account.
In CodeScan, on the
SAMLpage, go toActionsand click onEdit.Open the
Federation Metadata XMLcertificate that you have earlier downloaded from Azure in a new tab of your browser.In the
Edit SAML Connectiondialog box on CodeScan, enter the following values:Provider Entity Id: Copy the entityID value from the Federation Metadata XML certificate and paste it intoProvider Entity Idinside CodeScan.

Sign In URL: Copy the SingleSignOnService Location value and paste it into theSign In URLinside CodeScan.

Open the Certificate (Base64) that you have downloaded from Azure in your Notepad++, copy the entire content and paste into the
X509 Signing Certificatefield of the CodeScan SAML connection.

Click
Updateon the CodeScan page.The next step is to confirm your corporate domain to get the SSO working. You can confirm your domain by submitting a request to CodeScan Support.
Step 4: Testing the Single Sign-On Configuration
Log out of the CodeScan Console, and then log back in using the
Log in with SAML2option.Enter the corporate domain name you have configured when enabling SSO inside CodeScan in the
Your Company emailfield. For example: autorabit.comYou should successfully redirect to the CodeScan
Organizationpage after authentication.
Here is a sample document from Microsoft Entra SSO on how to setup network zones that restrict access to apps registered in Microsoft Entra: https://learn.microsoft.com/en-us/entra/identity/conditional-access/concept-assignment-network.
Last updated
Was this helpful?

