Authentication using Microsoft Entra ID
With an identity federation, you can use Microsoft Entra ID
Authentication setup includes the following steps:
Getting started
To follow the steps described in this section, you will need an Azure account with an active subscription.
Creating and configuring a SAML application in Azure
Create a SAML application and download a certificate
In Microsoft Azure, a SAML application acts as an identity provider (IdP). Create a SAML application and download a certificate:
-
Go to the Azure portal
. -
Under Azure services, select Microsoft Entra ID.
-
In the left-hand panel, select Enterprise Applications.
-
Click New application.
-
On the Browse Microsoft Entra gallery page, click Create your own application.
-
In the window that opens:
-
Name the application.
-
Select Integrate any other application you don't find in the gallery (Non-gallery).
-
Click Create.
-
-
On the Browse page that opens, use the left-hand panel to select Single sign-on.
-
Select the SAML single sign-on method.
-
On the SAML-based sign-on page, under 3. SAML signature certificate, download the certificate (Base64). The IdP uses it to sign the user authenticated message.
Do not close the page, as you will need the IdP server data when creating and setting up a federation.
Add users
Add users to the IdP server:
-
Go to the Enterprise Applications
page. -
Select the SAML application created.
-
On the left-hand panel, select Users and groups.
-
Click Add user or group.
-
In the Users field, click None Selected.
-
In the window that opens, check users and click Select.
-
Click Assign.
Creating and setting up a federation in Yandex Cloud Organization
Create a federation
-
Go to Yandex Cloud Organization
. -
In the left-hand panel, select
Federations. -
Click
Create federation in the top-right corner of the page. In the window that opens:-
Give your federation a name. It must be unique within the folder.
-
You can also add a description, if required.
-
In the Cookie lifetime field, specify the time before the browser asks the user to re-authenticate.
-
In the IdP Issuer field, insert the link from the Microsoft Entra ID field on the SAML-based sign-on page in Entra ID. The link should have the following format:
https://sts.windows.net/<SAML_app_ID>/
-
In the Link to the IdP login page field, insert the link from the Login URL field on the SAML-based sign-on page in Entra ID. The link should have the following format:
https://login.microsoftonline.com/<SAML_app_ID>/saml2
You can only use HTTP and HTTPS in a link.
-
Enable Automatically create users to automatically add users to your organization once they sign in. Otherwise, you will need to manually add your federated users.
A federated user is created automatically only when they log in to a cloud for the first time. If you removed a user from the federation, you can only add them back manually.
-
Enable Mandatory re-authentication (ForceAuthn) in IdP to set ForceAuthn to
true
in the SAML authentication request. If enabled, the IdP will request the user to re-authenticate once the Yandex Cloud session expires. -
Click Create federation.
-
If you do not have the Yandex Cloud command line interface yet, install and initialize it.
The folder specified in the CLI profile is used by default. You can specify a different folder using the --folder-name
or --folder-id
parameter.
-
View the description of the create federation command:
yc organization-manager federation saml create --help
-
Create a federation:
yc organization-manager federation saml create --name my-federation \ --organization-id <organization_ID> \ --auto-create-account-on-login \ --cookie-max-age 12h \ --issuer "https://sts.windows.net/<SAML_app_ID>/" \ --sso-url "https://login.microsoftonline.com/<SAML_app_ID>/saml2" \ --sso-binding POST \ --force-authn
Where:
-
--name
: Federation name. It must be unique within the folder. -
--organization-id
: Organization ID. -
--auto-create-account-on-login
: Flag enabling the automatic creation of new cloud users after authenticating on the IdP server.
This option makes it easier to create users; however, users created this way will not be able to do anything with cloud resources. This does not apply to the resources for which roles are assigned to theAll users
orAll authenticated users
public group.If this option is off, users not added to the organization will not be able to log in to the management console, even if they authenticate on your IdP server. In this case, you can manage a list of users allowed to use Yandex Cloud resources.
-
--cookie-max-age
: Time before the browser asks the user to re-authenticate. -
--issuer
: ID of the IdP server to use for authentication.Use the link from the Microsoft Entra ID field on the SAML-based sign-on page in Entra ID. The link should have the following format:
https://sts.windows.net/<SAML_app_ID>/
-
--sso-url
: URL of the page the browser has to redirect the user to for authentication.Use the link from the Login URL field on the SAML-based sign-on page in Entra ID. The link should have the following format:
https://login.microsoftonline.com/<SAML_app_ID>/saml2
You can only use HTTP and HTTPS in a link.
-
--sso-binding
: Specify the single sign-on binding type. Most identity providers support thePOST
binding type. -
(Optional)
--force-authn
: When the Yandex Cloud session expires, your IdP will prompt the user to re-authenticate.
-
If you don't have Terraform, install it and configure the Yandex Cloud provider.
-
Specify the federation parameters in the configuration file.
Here is an example of the configuration file structure:
resource "yandex_organizationmanager_saml_federation" federation { name = "my-federation" organization_id = "<organization_ID>" auto_create_account_on_login = "true" issuer = "https://sts.windows.net/<SAML_app_ID>/" sso_url = "https://login.microsoftonline.com/<SAML_app_ID>/saml2" sso_binding = "POST" security_settings { encrypted_assertions = "true" force_authn = "true" } }
Where:
-
name
: Federation name. It must be unique within the folder. -
description
: Federation description. -
organization_id
: Organization ID. -
labels
: Set of key/value label pairs assigned to the federation. -
issuer
: ID of the IdP server to use for authentication.Use the link from the Microsoft Entra ID field on the SAML-based sign-on page in Entra ID. The link should have the following format:
https://sts.windows.net/<SAML_app_ID>/
-
sso_binding
: Specify the single sign-on binding type. Most identity providers support thePOST
binding type. -
sso_url
: URL of the page the browser redirects the user to for authentication.Use the link from the Login URL field on the SAML-based sign-on page in Entra ID. The link should have the following format:
https://login.microsoftonline.com/<SAML_app_ID>/saml2
You can only use HTTP and HTTPS in a link.
-
cookie_max_age
: Time in seconds before the browser asks the user to re-authenticate. The default value is8 hours
. -
auto_create_account_on_login
: Flag enabling the automatic creation of new cloud users after authenticating on the IdP server.
This option makes it easier to create users; however, users created this way will not be able to do anything with cloud resources. This does not apply to the resources for which roles are assigned to theAll users
orAll authenticated users
public group.If this option is off, users not added to the organization will not be able to log in to the management console, even if they authenticate on your server. In this case, you can manage a list of users allowed to use Yandex Cloud resources.
-
case_insensitive_name_ids
: Toggles username case sensitivity.
If this option is enabled, the IDs of federated user names will be case-insensitive. -
security_settings
: Federation security settings:-
encrypted_assertions
: Sign authentication requests.If this option is enabled, all authentication requests from Yandex Cloud will have a digital signature.
-
force-authn
: When the Yandex Cloud session expires, your IdP will prompt the user to re-authenticate. This is an optional parameter.
-
For more information about the
yandex_organizationmanager_saml_federation
resource parameters, see the provider documentation . -
-
Make sure the configuration files are correct.
-
In the command line, go to the folder where you created the configuration file.
-
Run a check using this command:
terraform plan
If the configuration is described correctly, the terminal displays the federation parameters. If the configuration contains any errors, Terraform will point them out.
-
-
Create a federation.
-
If the configuration does not contain any errors, run this command:
terraform apply
-
Confirm you want to create a federation.
This will create a federation in the specified organization. You can check the new federation and its settings in the organization's Federations
section. -
-
Create a file with the request body, e.g.,
body.json
:{ "name": "my-federation", "organizationId": "<organization_ID>", "autoCreateAccountOnLogin": true, "cookieMaxAge":"43200s", "issuer": "https://sts.windows.net/<SAML_app_ID>/", "ssoUrl": "https://login.microsoftonline.com/<SAML_app_ID>/saml2", "ssoBinding": "POST", "securitySettings": { "forceAuthn": true } }
Where:
-
name
: Federation name. It must be unique within the folder. -
organizationId
: Organization ID. -
autoCreateAccountOnLogin
: Flag enabling the automatic creation of new cloud users after authenticating on the IdP server.
This option makes it easier to create users; however, users created this way will not be able to do anything with cloud resources. This does not apply to the resources for which roles are assigned to theAll users
orAll authenticated users
public group.If this option is off, users not added to the organization will not be able to log in to the management console, even if they authenticate on your IdP server. In this case, you can manage a list of users allowed to use Yandex Cloud resources.
-
cookieMaxAge
: Time before the browser asks the user to re-authenticate. -
issuer
: ID of the IdP server to use for authentication.Use the link from the Microsoft Entra ID field on the SAML-based sign-on page in Entra ID. The link should have the following format:
https://sts.windows.net/<SAML_app_ID>/
-
ssoUrl
: URL of the page the browser has to redirect the user to for authentication.Use the link from the Login URL field on the SAML-based sign-on page in Entra ID. The link should have the following format:
https://login.microsoftonline.com/<SAML_app_ID>/saml2
You can only use HTTP and HTTPS in a link.
-
ssoBinding
: Specify the single sign-on binding type. Most identity providers support thePOST
binding type. -
forceAuthn
: Parameter that requires user re-authentication once a session expires in Yandex Cloud.
-
-
To create a federation, use the create REST API method for the Federation resource or the FederationService/Create gRPC API call and provide a file with the query parameters in your query.
Query example:
curl \ --request POST \ --header "Content-Type: application/json" \ --header "Authorization: Bearer <IAM_token>" \ --data '@body.json' \ https://organization-manager.api.cloud.yandex.net/organization-manager/v1/saml/federations
Response example:
{ "done": true, "metadata": { "@type": "type.googleapis.com/yandex.cloud.organization-manager.v1.saml.CreateFederationMetadata", "federationId": "ajeobmje4dgj********" }
The
federationId
property contains the ID of the federation you created. Save it for later use.
Add certificates
While authenticating, the Cloud Organization service should be able to verify the IdP server certificate. To enable this, add the downloaded certificate to the federation:
-
Log in to Yandex Cloud Organization
. -
In the left-hand panel, select
Federations. -
Click the row with the federation you want to add a certificate to.
-
Click Adding a certificate under Certificates at the bottom of the page.
-
Enter certificate name and description.
-
Choose how to add a certificate:
- To add a certificate as a file, click Choose a file and specify the path to it.
- To paste the contents of a copied certificate, select the Text method and paste the contents.
-
Click Add.
If you do not have the Yandex Cloud command line interface yet, install and initialize it.
The folder specified in the CLI profile is used by default. You can specify a different folder using the --folder-name
or --folder-id
parameter.
-
View a description of the add certificate command:
yc organization-manager federation saml certificate create --help
-
Add a federation certificate by specifying the certificate file path:
yc organization-manager federation saml certificate create \ --federation-id <federation_ID> \ --name "my-certificate" \ --certificate-file certificate.cer
Use the create method for the Certificate resource:
-
Create a request body. In the
data
property, specify the contents of the certificate:{ "federationId": "<federation_ID>", "name": "my-certificate", "data": "-----BEGIN CERTIFICATE..." }
-
Send the request to add the certificate:
export IAM_TOKEN=CggaAT******** curl \ --request POST \ --header "Content-Type: application/json" \ --header "Authorization: Bearer ${IAM_TOKEN}" \ --data '@body.json' \ "https://organization-manager.api.cloud.yandex.net/organization-manager/v1/saml/certificates"
Tip
Make sure to reissue certificates and add them to a federation in a timely manner.
To keep track of when your certificate expires, subscribe to notifications from the organization. Subscribed users get notifications 60, 30, and 5 days before the certificate expires and after its expiration.
Setting up single sign-on (SSO)
Specify the redirect URL
Once you have created a federation, complete the creation of the SAML application in Azure:
-
Open the SAML-based sign-on SAML application settings page.
-
Under 1. Basic SAML configuration, specify information on Yandex Cloud acting as the service provider. To do this, in the ID (entity) and Response URL (assertion consumer service URL) fields, enter the ACS URL to redirect users to after successful authentication.
How to get the federation ACS URL
-
Log in to Yandex Cloud Organization
. -
In the left-hand panel, select
Federations. -
Select the required federation and copy the ACS URL field value on the federation info page.
-
-
Click Save.
Configure user attribute mapping
Warning
It is mandatory to configure user attribute mapping.
Following user authentication, the IdP server will send a SAML message to Yandex Cloud containing:
-
Information about successful authentication.
-
User attributes, such as the name ID, name, and email address.
To configure mapping between SAML message attributes and personal data, on the SAML-based sign-on page under 2. User attributes & claims, click Edit.
Types of personal data supported by Yandex Cloud Organization for Entra ID are given below.
User data | Comment | Application Attributes |
---|---|---|
Unique user ID (name ID) | Required attribute. By default, Entra ID uses User Principal Name (UPN) in <login>_<domain>#EXT#@<provider>.onmicrosoft.com format as the attribute source. When manually adding users to a federation, this name ID format is not supported. We recommend changing the attribute source in Entra ID: choose email address, user.mail , instead of UPN, user.userprincipalname . |
Unique user ID claim |
Last name | Displayed in Yandex Cloud services. Value length limit: 64 characters. |
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/surname |
Name | Displayed in Yandex Cloud services. Value length limit: 64 characters. |
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/givenname |
Full name | Displayed in Yandex Cloud services. Example: Ivan Ivanov .Value length limit: 64 characters. |
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name |
Used to send notifications from Yandex Cloud services. Example: ivanov@example.com .Value length limit: 256 characters. |
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress |
Warning
If the attribute value exceeds the length limit, the value part that goes beyond the limit is truncated.
Add users to your organization
If you did not enable the Automatically create users option when creating the federation, you will have to add federated users to your organization manually.
To do this, you will need user name IDs. They are returned by the IdP server together with a response confirming successful authentication.
If the Automatically create users option is enabled, a federation will only add users logging in to a cloud for the first time. If a federated user has been removed, they can only be added again manually.
A user can be added by the organization administrator (the organization-manager.admin
role) or owner (the organization-manager.organizations.owner
role). To learn how to grant a role to a user, see Roles.
Note
To enable a user to access the management consoleresource-manager.clouds.member
. However, you may also assign other roles if you know which permissions you want to grant to the invited users.
To grant these permissions to all the organization users at once, assign the role to the All users in organization X
system group. When using the CLI or API, no additional roles are required.
-
Go to Yandex Cloud Organization
. -
In the left-hand panel, select
Users. -
In the top-right corner, click More
and select Add federated users. -
Select the identity federation to add users from.
-
List the name IDs of users, separating them with spaces or line breaks.
-
Click Add. This will give the users access to the organization.
If you do not have the Yandex Cloud command line interface yet, install and initialize it.
The folder specified in the CLI profile is used by default. You can specify a different folder using the --folder-name
or --folder-id
parameter.
-
View a description of the add user command:
yc organization-manager federation saml add-user-accounts --help
-
Add users by listing their name IDs separated by a comma:
yc organization-manager federation saml add-user-accounts --id <federation_ID> \ --name-ids=alice@example.com,bob@example.com,charlie@example.com
Where:
-
--id
: Federation ID. -
--name-ids
: Name IDs of users.
-
To add identity federation users to the cloud:
-
Create a file with the request body, e.g.,
body.json
. In the request body, specify the array of name IDs of users you want to add:{ "nameIds": [ "alice@example.com", "bob@example.com", "charlie@example.com" ] }
-
Send the request by specifying the federation ID in the parameters:
curl \ --request POST \ --header "Content-Type: application/json" \ --header "Authorization: Bearer <IAM_token>" \ --data '@body.json' \ https://organization-manager.api.cloud.yandex.net/organization-manager/v1/saml/federations/<federation_ID>:addUserAccounts
Authentication
When you finish setting up SSO, test that everything works properly:
-
Open your browser in guest or private browsing mode.
-
Use this URL to log in to the management console:
https://console.yandex.cloud/federations/<federation_ID>
How to get a federation ID
- Log in to Yandex Cloud Organization
. - In the left-hand panel, select
Federations. - Select the required federation and copy the Identifier field value on the federation info page.
The browser forwards you to the Microsoft authentication page.
- Log in to Yandex Cloud Organization
-
Enter your credentials and click Next.
On successful authentication, the IdP server will redirect you to the ACS URL you specified in the Entra ID settings and then to the management console