Set up SSO with Microsoft Entra
Set up SSO using Microsoft Entra.
The following guide should be used in conjunction with our BYOC starter config.
In order for your deployment to be accessible through HTTPS you need to configure DNS and register HTTPS certificates with AWS Certificate Manager.
Steps:
ACM Certificate (Target Region): Create an ACM certificate in the target deployment region. Include the following domains:
After creating the ACM certificate you will need to configure the DNS verification records in your DNS provider.
Once ACM shows that your domains are verified, you can continue with the deployment.
Create a new folder called deployment
. In the folder, create a main.tf
file as follows:
Run the first deployment
You should see an output like the below from Terraform. You will need to reference this in the next steps.
Now that your Application Load Balancer is deployed, you can configure your DNS records.
For your App domain create a CNAME record pointing to the dns_cname_record_for_app_domain
from the first_time_setup_config
deployment outputs. This will route traffic through to the Common Fate services.
After deploying you can test everything is working by opening your App domain in a browser and you should be directed to the login screen.
Your users will sign in to Common Fate using SAML SSO. Follow a guide below for your identity provider:
Set up SSO with Microsoft Entra
Set up SSO using Microsoft Entra.
Set up SSO with AWS IAM Identity Center
Set up SSO using AWS IAM Identity Center.
Set up SSO with Okta
Set up SSO using Okta.
Set up notifications with Slack
Notify and approve access inside of Slack.
Integrate with PagerDuty
Approve access contextually based on PagerDuty on-call status.