Microsoft Entra ID Integration (SAML)

This section provides instructions for administrator to configure Microsoft Entra ID as SAML Identity Provider for authenticating to KIOSK UI and Web Management Console.

Procedure to set Microsoft Entra ID as login method for KIOSK UI or WebMC

The login configuration for KIOSK UI and KIOSK WebMC are distinct and should be set up separately, and all the steps should be repeated. This document outlines the same and unique configuration steps for both WebMC and UI. When configuring the KIOSK UI login, refer to the UI instructions and disregard the WebMC sections, and vice versa.

1. Application Registration

Step 1. Access the Microsoft Entra admin center using your administrative credentials.

_Microsoft Entra admin center_

Microsoft Entra admin center

Step 2. Navigate to the Identity > Applications > Enterprise applications section.

_Enterprise applications_

Enterprise applications

Step 3. Select New application and choose the Create your own application option.

_New application menu_

New application menu

Step 4. Assign a descriptive name for your application and select Integrate any other application you don't find in the gallery (Non-gallery).

_Create your own application_

Create your own application

Step 5. Click Create to complete the application registration process.

2. User Assignment on Entra ID

Step 1. Navigate to the created application overview page.

Step 2. Select Users and groups.

Step 3. Click Add users/groups.

Step 4. Choose the users or groups you intend to grant access to the application and click Assign to complete the user assignment process.

_User and groups assignment page_

User and groups assignment page

3. Get App Federation Metadata Url

Step 1. Within the application overview page, navigate to the Single sign-on section.

Step 2. Choose SAML as the designated mode.

_Single sign-on configuration_

Single sign-on configuration

Step 3. Scroll down to section 3 (SAML Certificates), and copy the App Federation Metadata Url.

_SAML Certificates configuration_

SAML Certificates configuration

4. Configuration on WebMC

4.1. Set up authentication method for KIOSK UI

Step 1. Switch to the Kiosk Console Management, login with Administrative account, navigate to Workflows > Set Default Login Method

_Set Default Login Method for authentation to KIOSK UI_

Set Default Login Method for authentation to KIOSK UI

Step 2. Select Microsoft Entra ID on MetaDefender Kiosk Authentication

Step 3. Assign a descriptive name and paste the App Federation Metadata Url earlier to the Metadata URL. If setup properly, an identifier will appear.

_Microsoft Entra ID configuraion on WebMC_

Microsoft Entra ID configuraion on WebMC

Step 4. Create the Login URL with the provided Identifier value following the format:

<http/https>://localhost:<port>/metadefender_rest/uissologin/saml/<Identifier>

Substitute the placeholder enclosed in angle brackets <> with the present configuration of the Kiosk Console Management server and the identifier value you previously copied. "localhost" must not be modified.

Step 5. Copy the Login URL for 5. Configuring SAML Single Sign-On

API Integration is an optional advanced feature to enable fetching users from Entra ID server for Workflows assignment and contact adding. See Integrate with Microsoft GraphAPI and fetching Users/Groups for more details.

Step 6. Click on Save Updates to apply the changes

4.2. Set up authentication method for KIOSK WebMC

Step 1. Switch to the Kiosk Console Management, login with Administrative account, Navigate to User Management > User Directories > Add new directory

_Add new directory for authentation to KIOSK WebMC_

Add new directory for authentation to KIOSK WebMC

Step 2. Select Microsoft Entra ID type

Step 3. Assign a descriptive name and paste the App Federation Metadata Url earlier to the Metadata URL.

Step 4. Input Host or IP as your KIOSK WebMC remote access URL following the format:

<http/https>://localhost:<port>/metadefender_rest/ssologin/saml/<Identifier>

Step 5. Copy the Login URL for step 5. Configuring SAML Single Sign-On

API Integration is an optional advanced feature to enable fetching users from Entra ID server for Workflows assignment and contact adding. See Integrate with Microsoft GraphAPI and fetching Users/Groups for more details.

Step 6. Click Continue and finish steps for intial setup

5. Configuring SAML Single Sign-On

5.1. Basic SAML Configuration

Step 1. Switch back to the Microsoft Entra admin center, in the Single sign-on section. Scroll up to section 1 (Basic SAML Configuration), click on Edit.

_Editting Identifier (Entity ID)_

Editting Identifier (Entity ID)

Step 2. Within field Identifier (Entity ID) and Reply URL (Assertion Consumer Service URL), enter the Login URL that copied earlier.

_Change the configuration with provided Identifer_

Change the configuration with provided Identifer

Step 3. Click Save to finalize the SAML configuration.

5.2 Enable groups to login to SAML SSO

The following steps need to be completed if you want all users of a group are able to login into your application

Step 1. Edit Attributes & Claims for Group assigning

Step 2. Click on Add a group claim

Step 3. Configure the Group Claims as following and click Save

_Configuring the Group Claims_

Configuring the Group Claims

6. User assignment configuration on WebMC

KIOSK supports user assignments after finishing the integration by:

  • Manual adding with the UPN and Display Name
  • Add from User/Group available to add with API Integration is enabled.

6.1. User Assignment for login to KIOSK UI

You can assign the user/group to the specific Workflows of KIOSK by adding on Workflows > Create/Edit Workflow > Properties & Membership

_Properties & Membership assignment with fetched users/groups from Entra ID on WebMC_

Properties & Membership assignment with fetched users/groups from Entra ID on WebMC

You can add the user/group as reference contact of visitor on KIOSK UI at Workflows > Guest workflows > Visitor > Contacts

_Contacts adding for Visitor management workflow on WebMC_

Contacts adding for Visitor management workflow on WebMC

6.2. User assignment for login to KIOSK WebMC

Step 1. Assign a user to specific role by navigating to User Managerment > User Directories > Edit

Step 2. Click on Continue, select Role matching option

_Role assignment to login to KIOSK WebMC_

Role assignment to login to KIOSK WebMC

Step 3. Click Coninue and finish the settings.

Integrate with Microsoft GraphAPI and fetching Users/Groups

The optional feature "API Integration" enables KIOSK deeply integrate with Microsoft Entra ID to get the users from the Microsoft Entra ID server and put to User/Groups available to add section for Workflows assignment or Contacts visitor adding.

1. GraphAPI Application Registration

KIOSK requires a separate application registration with specific permissions to access user and group information within a tenant.

Step 1. Access the Microsoft Entra admin center (Microsoft Entra admin center) using your administrative credentials. Navigate to the Identity > Applications > Enterprise applications section.

_App registration configuration page_

App registration configuration page

Step 2. Select New registration and choose a descriptive name for your registration, then hit Register.

_Register an application page_

Register an application page

Step 3. Within the Registration Overview Page, click the Certificates & secrets blade, and hit New client secret.

_Get new client secret_

Get new client secret

Step 4. Set the description and expires time for the secret, then hit Add. Note Client Secret down for using later.

The Client Secret is accessible for viewing immediately after creation, but subsequently hidden.

_Add a client secret_

Add a client secret

Step 5. Next, click the API permissions page and click Add a permission.

_API permissions page_

API permissions page

Step 6. Within tab Request API permissions, select Microsoft APIs > Microsoft Graph > Application permissions. Then search and add these permissions:

  • User.Read.All permission to query users from tenant.
  • Group.Read.All permission to query groups from tenant.
  • GroupMember.Read.All permission to query users within groups.

After adding all permissions, hit the button Grant admin consent for Default Directory. Review the permissions below.

_Adding all needed permissions_

Adding all needed permissions

2. Configure GraphAPI Integration

Step 1. Switch to the Overview Page, note down these values:

  • Application (client) ID.
  • Directory (tenant) ID.
  • Client secret.
_Necessary input that will be used on WebMC_

Necessary input that will be used on WebMC

Step 2. Switch to the Kiosk Console Management, login with Administrative account.

Step 3. Navigate to Workflows > Set Default Login Method > Microsoft Entra ID.

Step 4. Enable API Integration, then input 3 fields Client ID, Client Secret and Tenant ID. Then hit Save Update.

_API Integration configuration on WebMC_

API Integration configuration on WebMC

Sign in to the KIOSK using your Microsoft Entra ID account

  • When authorized user wants to login on the Kiosk Interface Application, they must provide their User Principle Name. This property has the format of <username>@<domain>.
  • Un-authorized users tries to login to the Kiosk Interface Application will result in the following error.
_Failed to login due to permission_

Failed to login due to permission

Retrieving files from MFT or directory via SSO is not yet supported.

Set up for multiple KIOSKs using mass configuration on OCM/My OPSWAT

Mass configuration for managed/enrolled KIOSK instances can be accomplished by using the group setting functionality within OCM (OPSWAT Central Management) and My OPSWAT.

All KIOSKs within the group setting can authenticate with Microsoft Entra ID using identical Metadata URLs and Reply URL.

Type to search, ESC to discard
Type to search, ESC to discard
Type to search, ESC to discard