Navigation

Configure Federated Authentication from Azure AD

This guide shows you how to configure federated authentication using Azure AD as your IdP.

After integrating Azure AD and Cloud Manager, you can use your company’s credentials to log in to Cloud Manager and other MongoDB cloud services.

Limitations

Cloud Manager doesn’t support single sign-on integration for database users.

Prerequisites

To use Azure AD as an IdP for Cloud Manager, you must have:

  • An Azure subscription. To obtain a subscription, visit the Microsoft Azure portal.
  • An Azure AD tenant associated with your subscription. For information about setting up an Azure AD tenant, see the Azure AD Documentation.
  • A Premium P2 license for Azure AD.
  • Global Administrator privileges in your Azure AD tenant.
  • A custom, routable domain name.

Procedures

Add Domain users

If you haven’t already, use the Azure console to add your custom domain name to Azure AD and create users:

1

Add your custom domain to Azure AD.

Add your custom domain name to Azure AD to create users that belong to your domain. After you add your domain, you must also add the Azure AD DNS information in a TXT record with your DNS provider and verify the configuration.

To add your custom domain to Azure AD, see the Azure documentation.

2

Create Azure AD Users.

If they don’t exist already, create users in Azure AD that you want to grant database access to. Users must belong to the custom domain you added to Azure AD.

To create Azure AD users, see the Azure documentation.

Configure Azure AD as an Identity Provider

Use the Azure console to configure Azure AD as a SAML IdP. You can either add the MongoDB Cloud app from the Gallery or configure an application manually.

1
2

Assign users to the application.

Assign users to the application. These users will have access to Cloud Manager and other MongoDB cloud services when you complete the tutorial.

To assign Azure AD users to an application, see the Azure documentation.

3
4

Download the SAML signing certificate encoded in Base64.

In the SAML Signing Certificate section, click Download next to Certificate (Base64).

You upload this signing certificate to the MongoDB Federation Management Console later in the tutorial.

5

Copy the values of the Login URL and Azure AD Identifier fields.

Paste these values into a text editor or another easily accessible location.

You enter these values in the MongoDB Federation Management Console later in the tutorial.

1
2

Assign users to the application.

Assign users to the application. These users will have access to Cloud Manager and other MongoDB cloud services when you complete the tutorial.

To assign Azure AD users to an application, see the Azure documentation.

3

Navigate to the SAML configuration page to begin configuring single sign-on.

To navigate to the SAML configuration page, see the Azure documentation.

Important

Don’t edit the fields in the Basic SAML Configuration section. You get this information from Cloud Manager later in the tutorial.

4

Optional: Delete the Additional Claims.

To simplify the SAML configuration, you can delete the default Additional claims:

  1. In the User Attributes & Claims section, click the Edit icon.
  2. For each claim in the Additional claims section, expand the Context menu, then click Delete.
5

Edit the Unique User Identifier required claim.

Use the following values:

  • Choose name identifier format: Unspecified

  • Source: Attribute

  • Source attribute: user.userprincipalname

    Note

    Depending on your Active Directory configuration, the source attribute you use may be different. Use the source attribute that contains a user’s full email address.

To edit the Unique User Identifier required claim, see the Azure documentation.

6

Add user claims to the SAML token.

Add the following user claims to the SAML token Azure AD sends to Cloud Manager:

Important

The values in the Name column are case-sensitive. Enter them exactly as shown.

You must leave the Namespace field empty for all user claims.

Name Source Source Attribute
firstName Attribute user.givenname
lastName Attribute user.surname
email Attribute user.userprincipalname

Note

Depending on your Active Directory configuration, the source attributes you use may be different. Use the source attributes that contain a user’s first name, last name, and full email address for the appropriate claims.

To add user claims, see the Azure documentation.

7

Verify that the SAML signing certificate uses SHA-256.

To verify that the SAML signing certificate uses the SHA-256 signing algorithm, see the Azure documentation.

8

Download the SAML signing certificate encoded in Base64.

In the SAML Signing Certificate section, click Download next to Certificate (Base64).

You upload this signing certificate to the MongoDB Federation Management Console later in the tutorial.

9

Copy the values of the Login URL and Azure AD Identifier fields.

Paste these values into a text editor or another easily accessible location.

You enter these values in the MongoDB Federation Management Console later in the tutorial.

Add Azure AD as an Identity Provider

Use the Federation Management Console and the Azure console to add Azure AD as an IdP:

1

Open the Federation Management Console.

  1. Log in to Cloud Manager.
  2. Use the dropdown at the top-left of Cloud Manager to select the organization for which you want to manage federation settings.
  3. Click Settings in the left navigation pane.
  4. In Manage Federation Settings, click Visit Federation Management App.
2

Add Azure AD to Cloud Manager as an Identity Provider.

  1. Click Add Identity Providers

  2. If you do not have any Identity Providers configured yet, click Setup Identity Provider. Otherwise, On the Identity Providers screen, click Add Identity Provider.

  3. Enter or select the following SAML Protocol Settings. All fields are required:

    Field Description
    Configuration Name Enter a descriptive name, such as Azure AD.
    Login URL

    Enter a URL to serve as the Cloud Manager login page. Give this URL to your users to have them bypass the main Cloud Manager login page where they enter their username. This URL redirects users to the IdP Single Sign-On URL.

    Note

    The Login URL must be unique across MongoDB cloud services.

    IdP Issuer URI Paste the Azure AD Identifier you copied from Azure earlier in the tutorial.
    IdP Single Sign-On URL Paste the Login URL you copied from Azure earlier in the tutorial.
    IdP Signature Certificate Upload the Base64-encoded SAML signing certificate you downloaded from Azure earlier in the tutorial.
    Request Binding Select HTTP POST.
    Response Signature Algorithm Select SHA-256.
    Apply to Organizations Select organizations to connect to this IdP. When users authenticate through Azure AD for the first time, Cloud Manager grants them membership in the selected organizations. Manage organization mapping to choose what role these users have within the selected organizations.
  4. Click Next.

3

Download the metadata file with details that recognize MongoDB as a Service Provider.

  1. Click Download metadata. You upload this file to Azure AD in the next step.
  2. Click Finish.
3

Upload the metadata file to Azure to finish configuring Azure AD as an IdP.

To upload the file, see the Azure documentation.

4

Validate your single sign-on configuration.

To confirm your configuration, see the Azure documentation.

Map your Domain

Mapping your domain to the IdP lets Cloud Manager know that users from your domain should be directed to the Login URL you provide.

When users visit the Cloud Manager login page, they enter their email address. If the email domain is associated with an IdP, they are sent to the custom Login URL for that IdP.

Important

You can map a single domain to multiple identity providers. If you do, users who log in using the MongoDB Cloud console are automatically redirected to the first matching IdP mapped to the domain.

To log in using an alternative identity provider, users must either:

  • Initiate the MongoDB Cloud login through the desired IdP, or
  • Log in using the Login URL associated with the desired IdP.

Use the Federation Management Console to map your domain to the IdP:

1

Open the Federation Management Console.

  1. Log in to Cloud Manager.
  2. Use the dropdown at the top-left of Cloud Manager to select the organization for which you want to manage federation settings.
  3. Click Settings in the left navigation pane.
  4. In Manage Federation Settings, click Visit Federation Management App.
2

Enter domain mapping information.

  1. Click Add a Domain.

  2. On the Domains screen, click Add Domain.

  3. Enter the following information for your domain mapping:

    Field Description
    Display Name Name to easily identify the domain.
    Domain Name Domain name to map.
  4. Click Next.

3

Choose how to verify your domain.

Note

You can choose the verification method once. It cannot be modified. To select a different verification method, delete and recreate the domain mapping.

Select the appropriate tab based on whether you are verifying your domain by uploading an HTML file or creating a DNS TXT record:

Upload an HTML file containing a verification key to verify that you own your domain.

  1. Click HTML File Upload.
  2. Click Next.
  3. Download the mongodb-site-verification.html file that Cloud Manager provides.
  4. Upload the HTML file to a web site on your domain. You must be able to access the file at <https://host.domain>/mongodb-site-verification.html.
  5. Click Finish.

Create a DNS TXT record with your domain provider to verify that you own your domain. Each DNS record associates a specific Cloud Manager organization with a specific domain.

  1. Click DNS Record.

  2. Click Next.

  3. Copy the provided TXT record. The TXT record has the following form:

    mongodb-site-verification=<32-character string>
    
  4. Log in to your domain name provider (such as GoDaddy.com or networksolutions.com).

  5. Add the TXT record that Cloud Manager provides to your domain.

  6. Return to Cloud Manager and click Finish.

4

Verify your domain.

The Domains screen displays both unverified and verified domains you’ve mapped to your IdP. To verify your domain, click the target domain’s Verify button. Cloud Manager shows whether the verification succeeded in a banner at the top of the screen.

Associate Your Domain with Your Identity Provider

After successfully verifying your domain, use the Federation Management Console to associate the domain with Azure AD:

1

Click Identity Providers in the left navigation.

2

For the IdP you want to associate with your domain, click pencil icon next to Associated Domains.

3

Select the domain you want to associate with the IdP.

4

Click Confirm.

Test Your Domain Mapping

Important

Before you begin testing, copy and save the Bypass SAML Mode URL for your IdP. Use this URL to bypass federated authentication in the event that you are locked out of your Cloud Manager organization.

While testing, keep your session logged in to the Federation Management Console to further ensure against lockouts.

To learn more about Bypass SAML Mode, see Bypass SAML Mode.

Use the Federation Management Console to test the integration between your domain and Azure AD:

1

In a private browser window, navigate to the Cloud Manager log in page.

2

Enter a username (usually an email address) with your verified domain.

Example

If your verified domain is mongodb.com, enter alice@mongodb.com.

3

Click Next.

If you mapped your domain correctly, you’re redirected to your IdP to authenticate. If authenticating with your IdP succeeds, you’re redirected back to Cloud Manager.

Note

You can bypass the Cloud Manager log in page by navigating directly to your IdP’s Login URL. The Login URL takes you directly to your IdP to authenticate.

(Optional) Map an Organization

Use the Federation Management Console to assign your domain’s users access to specific Cloud Manager organizations:

1

Open the Federation Management Console.

  1. Log in to Cloud Manager.
  2. Use the dropdown at the top-left of Cloud Manager to select the organization for which you want to manage federation settings.
  3. Click Settings in the left navigation pane.
  4. In Manage Federation Settings, click Visit Federation Management App.
2

Connect an organization to the Federation Application.

  1. Click View Organizations.

    Cloud Manager displays all organizations where you are an Organization Owner.

    Organizations which are not already connected to the Federation Application have Connect button in the Actions column.

  2. Click the desired organization’s Connect button.

3

Apply an Identity Provider to the organization.

From the Organizations screen in the management console:

  1. Click the Name of the organization you want to map to an IdP.

  2. On the Identity Provider screen, click Apply Identity Provider.

    Cloud Manager directs you to the Identity Providers screen which shows all IdPs you have linked to Cloud Manager.

  3. For the IdP you want to apply to the organization, click Modify.

  4. At the bottom of the Edit Identity Provider form, select the organizations to which this IdP applies.

  5. Click Next.

  6. Click Finish.

4

Connect an organization to the Federation Application.

  1. Click Organizations in the left navigation.
  2. In the list of Organizations, ensure that your desired organization(s) now have the expected Identity Provider.

(Optional) Configure Advanced Federated Authentication Options

You can configure the following advanced options for federated authentication for greater control over your federated users and authentication flow:

Note

The following advanced options for federated authentication require you to map an organization.

Sign in to Cloud Manager Using Your Login URL

All users you assigned to the Azure application can log in to Cloud Manager using their Azure AD credentials on the Login URL. Users have access to the organizations you mapped to your IdP.

Important

You can map a single domain to multiple identity providers. If you do, users who log in using the MongoDB Cloud console are automatically redirected to the first matching IdP mapped to the domain.

To log in using an alternative identity provider, users must either:

  • Initiate the MongoDB Cloud login through the desired IdP, or
  • Log in using the Login URL associated with the desired IdP.

If you selected a default organization role, new users who log in to Cloud Manager using the Login URL have the role you specified.