Configuring SAML Integration Between MS Entra (formerly Azure AD) and Nullafi Shield
Prerequisites
Before beginning the configuration process, ensure you have:
- A fully operational Nullafi Shield instance
- The Shield web dashboard configured with SSL (mandatory for SAML)
- A browser configured to use Nullafi Shield
- A MS Entra plan on Azure
- The following example information (replace with your actual details):
- Company: Maverick Co
- Domain: maverickco.com
- Nullafi Shield Dashboard URL: https://shield.maverickco.com
Introduction
Nullafi Shield supports SAML single sign-on authentication for end-users. When enabled, application requests are redirected to your Identity Provider (such as MS Entra) for authentication before granting access. After successful authentication, users won't receive additional prompts during their session. Session duration can be configured through the Nullafi Shield dashboard.
Part I: MS Entra Configuration
Creating the Application
- Log into the Azure portal
- Navigate to Microsoft Entra
- Select Enterprise applications
- Click New application
- Select Create your own application
- Enter an application name (e.g., "Nullafi-Shield")
- Select Integrate any other application you don't find in the gallery (Non-gallery)
- Click Create
Configuring Single Sign-On
- In the application overview, select Single sign-on from the left sidebar
- Choose SAML as the authentication method
- Configure the Basic SAML Configuration:
- Click Edit
- Enter the following values:
- Identifier (Entity ID): https://shield.maverickco.com/user/saml/metadata
- Reply URL (Assertion Consumer Service URL): https://shield.maverickco.com/user/saml/acs
-
Click Save
-
Configure Attributes & Claims:
- Click Edit
- Add the first claim:
- Click Add new claim
- Name: email
- Source attribute: user.userprincipalname
- Click Save
- Add the second claim:
- Click Add new claim
- Name: username
- Source attribute: user.userprincipalname
- Click Save
- Close the attributes editor (X button)
- Download the SAML certificate:
- Under SAML Certificates, click the Federation Metadata XML download link
- Save this file locally (you'll need it for the Shield configuration)
- Close the dialog (X button)
Assigning Users and Groups
- Return to the application overview and select Assign users and groups
- Click Add user/group
- Select the users or groups that should have access to Nullafi Shield
- Note: Depending on your MS Entra plan, you might be limited to adding only users, not groups
Part II: Nullafi Shield Configuration
- Access your Nullafi Shield Dashboard (e.g., https://shield.maverickco.com)
- Log in and navigate to Configuration in the left sidebar
- Click at ICAP
- Under Security, set Authentication Method to SAML
- Open the Federation Metadata XML file you downloaded earlier in a text editor
- Copy the entire content of the file
- Click Set IDp Metadata and paste the XML content
- Click Save
- Under Allowed URLs, check the Azure SAML option
- Scroll to the bottom and click Save Changes
Verification
- Open a browser configured to use Nullafi Shield
- Navigate to a web application (e.g., Hubspot.com)
- You should be redirected to the MS Entra login page (unless already authenticated)
- To verify the user session:
- Return to the Nullafi Shield Dashboard
- Navigate to Configuration > SAML Sessions
- Confirm that the user session appears as active