Azure Active Directory Integration
TigerTrust integrates with Azure Active Directory (Microsoft Entra ID) for comprehensive enterprise identity management.
Application Registration
Register TigerTrust in Azure AD:
1. Navigate to Azure Portal > Azure Active Directory > App registrations
2. Click "New registration"
3. Name: TigerTrust
4. Redirect URI: https://api.tigertrust.io/auth/callback
5. Configure permissions and certificates
SAML SSO Configuration
Configure SAML 2.0 SSO:
<!-- SAML Configuration --> <EntityDescriptor entityID="https://tigertrust.io/saml/metadata"> <SPSSODescriptor> <AssertionConsumerService Binding="urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST" Location="https://api.tigertrust.io/auth/saml/callback"/> </SPSSODescriptor> </EntityDescriptor>
OIDC Configuration
Alternative OIDC setup:
oidc: authority: https://login.microsoftonline.com/{tenant-id}/v2.0 client_id: your-client-id client_secret: $AZURE_CLIENT_SECRET scopes: - openid - profile - email - User.Read
Conditional Access
Configure conditional access for TigerTrust:
Policy: Require MFA for Certificate Operations
---
Assignments:
- Users: All users
- Cloud apps: TigerTrust
- Conditions:
- Device platforms: All
- Client apps: Browser, Mobile apps
Access controls:
- Grant: Require multi-factor authentication
- Session: Sign-in frequency = 1 hour
SCIM Provisioning
Enable automatic user provisioning:
scim: endpoint: https://api.tigertrust.io/scim/v2 token: $SCIM_TOKEN mapping: users: userName: userPrincipalName displayName: displayName emails: mail active: accountEnabled groups: displayName: displayName members: members
Group-Based Roles
Map Azure AD groups to TigerTrust roles:
| Azure AD Group | TigerTrust Role | |---------------|-----------------| | TigerTrust-Admins | Administrator | | TigerTrust-Operators | Operator | | TigerTrust-Viewers | Viewer | | Certificate-Team | Certificate Manager |
App Roles
Define app roles in Azure AD:
{ "appRoles": [ { "displayName": "Certificate Administrator", "value": "CertAdmin", "description": "Full certificate management access" }, { "displayName": "Certificate Operator", "value": "CertOperator", "description": "Certificate operations access" } ] }
MFA Enforcement
Require MFA for sensitive operations:
- Certificate revocation
- Private key export
- Policy modifications
- User role changes
Secure your certificate management with Azure AD and TigerTrust.