Before you begin configuring single sign-on on the Cloud App Security management console, make sure
that:
-
You have granted Cloud App Security access to Exchange Online, SharePoint Online, or OneDrive. For details, see Granting access to Microsoft 365 services.
-
You are logged on to the management console as a Cloud App Security global administrator.
Procedure
- Go to .The Single Sign-On screen appears.
- Configure the general settings for single sign-on.
- Select Enable SSO.
- Select the identity provider in Identity Provider.
- Specify the service URL you recorded when configuring the identity
provider.Identity ProviderService URLMicrosoft Entra IDMicrosoft Entra ID Premium edition: Login URL
Note
Cloud App Security no longer supports SSO configuration for the Azure AD Free or Basic edition for security reasons.AD FShttps://example.com/adfs/lsOktaIdentity Provider Single Sign-On URLGoogle Workspacehttps://accounts.google.com/o/saml2/initsso?idpid=example1&spid=example2&forceauthn=falseNote
Replace the variables example1 and example2 in the URL.PingOneInitiate Single Sign-On URL - Specify the application identifier you recorded when configuring the
identity provider.Identity ProviderApplication IdentifierMicrosoft Entra IDMicrosoft Entra ID Premium edition: Application ID
Note
Cloud App Security no longer supports SSO configuration for the Azure AD Free or Basic edition for security reasons.AD FSRelying party trust identifierOktaIdentity Provider IssuerGoogle WorkspaceEntity IDPingOneIssuer ID - Locate the Base-64 encoded X.509 certificate file you recorded in Okta
or Google Workspace, downloaded in Microsoft Entra ID or PingOne configuration, or
exported in AD FS configuration, and then copy and paste the content in
the text box.
Note
This field is required for security reasons. Since the Microsoft Entra ID Free and Basic editions do not support certificates, you are unable to configure SSO for the two editions in Cloud App Security.
- Click Save.
Note
After configuring SSO settings, administrators added from your AD infrastructure, Okta organization, Google Workspace, or PingOne can use their AD, Okta, Google Workspace, or PingOne account credentials to single sign on to the management console.