SecHard
SecHard and Entra ID Integration Guide.
This document covers the integration of SecHard with Entra ID. Steps marked as optional are used to enable automatic synchronization. For these steps, the SecHard server must have internet access. If these steps are not performed, existing users will still be retrieved.
SecHard Configuration
Go to Settings → System → Auth → SAML in the SecHard interface.
Enable the Enable SAML Authentication option.
Disable Sign Requests.
Click Generate Signing Certificate and fill in the required information.
After saving, click the Download Metadata button on the right and save the file. This metadata will be used later in the Entra ID interface.
Entra ID Configuration
Log in to Entra ID.
Go to Enterprise Applications and click New Application.
Provide a name for the application and select Integrate any other application you don’t find in the gallery, then click Create.
Optional: Automatic User and Group Synchronization
Note: This requires SecHard to have continuous internet access.
Go to the Application Proxy section.
Define the Internal URL and External URL. A Windows client must be able to access the URL.
Set Pre-Authentication to Pass-Through.
Navigate to the Single Sign-On section and select SAML.
Click Upload Metadata and upload the metadata file downloaded from SecHard.
If a proxy was configured, enter the secondary URLs as well.
In the Single Sign-On section, go to Attributes & Claims.
Click Add a Group Claim and select Groups assigned to the application from the list, then click Save.
Download the Federation Metadata XML from SAML Certificates under the Single Sign-On section.
Entra ID User & Group Assignment
Go to the Users and Groups section under the application in Entra ID.
Click Add Users/Groups and select the users and groups to be assigned.
Final SecHard Setup
In SecHard, go to Settings → System → Auth → SAML → Identity Provider Configuration.
Upload the metadata XML downloaded from Entra ID.
Configure the Name, Attribute-Claim Mapping, Domain Name, and Default User Role.
Save the settings. After this, users can log in using Entra ID.
Optional: Provisioning Users via SCIM
After saving, click Create Secret Token for Bearer Authentication and save the token.
Go to Provision User Accounts under the application.
Enter the Tenant URL: the external URL from the proxy, followed by /api/scim.
Paste the secret token obtained from SecHard.
Save the configuration. After this, Entra ID users and groups will be automatically synchronized with SecHard.
SecHard