Step 1: Add Cobalt as a New Enterprise Application in Azure Active Directory
- Log in to the Azure AD portal as a Global Administrator
- Navigate to Azure Active Directory
- Under Manage, click Enterprise Applications
- Click +New Application
- Under Add your own app click Non-gallery application
- Add Cobalt - Pentest as a Service as name
- Click add to finish adding
Step 2: Configure the Cobalt Enterprise Application’s SSO settings
- In the overview page for your new enterprise application, under Manage, click Single Sign-on
- In the Single Sign-on Mode page, click SAML
- Under Basic SAML Configuration click edit/pen icon for Basic SAML Configuration
- Within the Basic SAML Configuration, add in the following
- Entity ID: https://api.cobalt.io/users/saml/metadata
- Reply URL (Assertion Consumer Service URL): https://api.cobalt.io/users/saml/auth
- Sign On URL: Leave this field blank for IdP-Initiated SAML
- Relay State: Leave this blank for now. Will have to come back and add in relay state token copied from Cobalt website
- Add custom attribute mappings to your SAML token attributes configuration.
-
In addition to above, Cobalt application expects few more attributes to be passed back in SAML response which are shown below. These attributes are also pre populated but you can review them as per your requirement
-
Under SAML Signing Certificate, click the Download link for the Certificate (Base64)
- On the Set up Cobalt section, copy the appropriate URL(s) based on your requirement.
Step 3: Assign Users and Groups to the Cobalt Application.
-
In the Azure portal, select Enterprise Applications, and then select All applications.
-
In the applications list, select Cobalt.
- In the app's overview page, find the Manage section and select Users and groups.
- Click Add User
- Select the users to whom you will grant access to Cobalt
- Click Select at the bottom right of the page
- Click Yes to confirm that you want to grant the selected users access.
Note: Users will have to be added to the Cobalt platform by the org owner and have to complete the sign-up process via email.
Step 4: Add the Azure AD settings to Cobalt
- Log in to Cobalt platform as an Owner role
- Select Settings on the left
- Select Identity & Access, and select Enable
- Enter in the details from your Azure portal
- Click Save
-
Use IdP RelayState Token returned by Cobalt App and paste it in the Basic SAML Configuration within Azure AD. Note: Please use the same formatting that you see within the Cobalt platform {"org_token":"000000-0000-0000-0000-000000000000" } when entering the org token into Azure AD
Users should now be able to sign in via Azure AD SSO
Frequently Asked Questions:
I have enabled SAML, but am unable to login to Cobalt.
One of the most common reasons why users aren’t able to login via their identity provider is because the emails do not match. The email address you are using in Azure AD must match your Cobalt account. If you are using two different emails, you will not be able to login.
What SSO providers are supported by Cobalt?
Cobalt currently supports Okta, OneLogin, DUO, AzureAD, Google.
Comments
0 comments
Please sign in to leave a comment.