1.0 Introduction
This document describes the steps to integrate Fortanix-Data-Security-Manager (DSM) with Microsoft Entra ID using a Security Assertion Markup Language (SAML) configuration for Single Sign-On (SSO)-based authentication.
It also covers the following details:
Creating a new Microsoft Entra ID application and configuring it with SAML for secure authentication.
Adding SAML authentication to an existing Enterprise application in Microsoft Entra ID.
2.0 Prerequisites
Ensure you have the following:
An active Azure subscription with administrator (admin) permissions in Microsoft Entra ID.
Admin access to Fortanix DSM for configuring SAML-based SSO.
An existing Enterprise application already set up in Microsoft Entra ID.
3.0 Create a New Entra ID Application with SAML
Perform the following steps to create a new Microsoft Entra ID application and configure it with SAML for secure authentication:
Log in to the Azure Portal.
From the Azure home page, navigate to Microsoft Entra ID. You will find it under Azure services or in the left navigation menu.

Figure 1: Access Microsoft Entra ID
Select Enterprise applications under the Manage menu.

Figure 2: Select Enterprise Applications
Click New Application.

Figure 3: Create a new application
Click Create your own application in the upper-left corner of the page.

Figure 4: Create your own application
On the Create your own application form,
Enter the name of the application.
Ensure Integrate any other application you don’t find in the gallery (Non-gallery) is selected.
Click Create to add a new application.

Figure 5: Add a name to the application
On the application’s Overview page, select Single Sign On from the Manage menu.

Figure 6: Select SSO
Select SAML from the available SSO methods.

Figure 7: Select SAML
Fill the required fields on the SAML-based Sign-on page and click Test. To verify the configuration.

Figure 8: SAML-based sign-on
Where,
1. In the Identifier (Entity ID) field, enter the value in the following format:
https://<fortanix_dsm_url>/saml/metadata.xmlFor example,
https://amer.smartkey.io/saml/metadata.xml.2. In the Reply URL (Assertion Consumer Service URL) field, enter the value in the following format:
https://<fortanix_dsm_url>/saml/.For example,
https://amer.smartkey.io/saml/.3. In SAML Certificates section, provide a Notification Email address and add a new certificate. Activate the certificate and save.
4. Download the Federation Metadata XML file. Open the file in a text editor and copy the complete XML content. This will be required later in Fortanix DSM for SAML configuration.
NOTE
You cannot create additional Entra ID applications with SAML; however, you can modify the existing Identifier (Entity ID) and Reply URL URLs and related settings.
If the Identifier (Entity ID) and Reply URL URLs are changed, a new SAML certificate must be generated and activated, and the old certificate must be deleted.
4.0 Configure Microsoft Entra ID SSO in Fortanix DSM
Perform the following steps to integrate Fortanix DSM with Microsoft Entra ID using SAML configuration:
Log in to the Fortanix DSM.
In the Fortanix DSM user interface (UI), navigate to Settings → AUTHENTICATION tab, and select SINGLE SIGN-ON as the authentication method.
Click ADD SAML INTEGRATION to add a new SAML integration.

Figure 9: Add SAML SSO
On the Add SAML integration page,
Click UPLOAD A FILE to browse and upload the SAML file downloaded in Step 9 of Section 3.0: Create a New Entra ID Application with SAML or directly paste the XML content saved previously in the text field.
In the SSO Title field, customize the SSO by adding a name in the SSO Title field and a URL for the logo image in the Logo URL field.
Click ADD INTEGRATION.

Figure 10: SAML SSO is added
After successfully integrating with Microsoft Entra ID SSO, Fortanix DSM displays the configured SSO.

Figure 11: SCIM SSO configured
5.0 Test the Integration
Perform the following steps to verify the SSO integration:
Log out of Fortanix DSM to sign in using SSO.
On the Fortanix DSM Login screen, click the LOG IN WITH MICROSOFT ENTRA ID to log in using the newly added SSO configuration.

Figure 12: Test the integration
The Microsoft Azure login page appears. Enter the SSO user credentials to log in and follow the steps.

Figure 13: Log in to the Microsoft Entra page
You will now be automatically logged in to Fortanix DSM and reach the Fortanix DSM accounts page.
6.0 Add SAML to an Existing Enterprise Application
If an Enterprise application already exists in Microsoft Entra ID, perform these steps to add SAML to it:
In Microsoft Entra ID, open your Enterprise application.
Perform Steps 7 to 9 in Section 3.0: Create a New Entra ID Application with SAML.
After adding the SAML to an existing application,
Perform the steps mentioned in Section 4.0: Configure Microsoft Entra ID SSO in Fortanix DSM to set up the SSO in Fortanix DSM.
Perform the steps mentioned in Section 5.0: Test the Integration to verify the integration.