Entra ID Example
Lighthouse can be added as an Enterprise application to Entra ID. This example uses “App roles” to grant users permissions.
To create an Application (Enterprise applications)
-
Go to Entra ID.
-
Go to Enterprise applications.
-
Click New Application.
-
Click Create your own application.
-
Select Integrate any other application you don't find in the gallery (Non-gallery).
-
Name your Application, for example, Lighthouse, then click Create.
-
Click Properties:
-
Set Assignment required to Yes.
-
Set Enabled for users to sign-in to Yes.
-
Click Save.
-
-
Go to Single sign-on:
-
Select SAML.
-
Edit Basic Configuration:
-
Add an Entity Id lighthouse-entra_id and set it as default.
-
In Reply URL (Assertion Consumer Service URL) add the SSO URL for each address of each Lighthouse that you want to be able to sign in on, i.e. IP addresses and DNS address for both your primary and secondary Lighthouses.
https://{primary lighthouse address}/api/v3.7/sessions/saml/sso/entra_id https://{primary lighthouse IP address}/api/v3.7/sessions/saml/sso/entra_id https://{secondary lighthouse address}/api/v3.7/sessions/saml/sso/entra_id https://{secondary lighthouse IP address}/api/v3.7/sessions/saml/sso/entra_id. -
Set Sign on URL to
https://{main lighthouse address}/api/v3.7/sessions/saml/sp_init/entra_id. -
Click Save.
-
-
Edit Attributes & Claims:
-
Remove the default claims from Additional claims.
-
Click Add new claim and enter:
-
Name:
LH_Groups -
Source Attributes:
user.assignedroles
-
-
-
IdP Metadata
-
Go to the Entra ID.
-
Go to Enterprise applications and open your application.
-
Go to Single sign-on.
-
Navigate to 3. SAML Signing Certificate and find and download
Federation Metadata XML.
Configure Lighthouse
-
Copy the Federation metadata XML to your primary Lighthouse.
-
Using
saml-idp-metadataon your primary lighthouse, configure each of your lighthouses to use your IdP:
For example,saml-idp-metadata -p {root password} create -m /path/to/metadata.xml -P azure_ad -n "My Entra ID display name" -l {LH id number}.Note: Where
{LH id number}is the configuration ID for Lighthouse. The primary Lighthouse has an ID of 1, and then any secondaries are assigned numbers from 2. You can run the following to obtain a list of your Lighthouse configuration IDs:saml-idp-metadata -p <LH password> list.
App Roles Setup
After this initial setup, you will be able to login as a SAML user. If you do not already have your own User groups setup in Lighthouse, you can set them up as follows:
-
Login to Lighthouse as a local user (or any non-SAML user) i.e.
root. -
Create the User groups with the Roles and permission required.
See Add app roles and get them from a token - Microsoft identity platform for up to date documentation on how to create and assign App Roles.
-
Go to Entra ID.
-
Go to App registrations.
-
Open your app (Use the All Applications tab to see Enterprise apps).
-
Go to App Roles.
-
Click Create App Role.
-
Set the value to match your usergroup on Lighthouse.
-
Set Allowed member types to
Both (Users/Groups + Applications). -
Set the other fields as required.
-
-
Go to Entra ID.
-
Go to Enterprise applications.
-
Open your App, that is, Lighthouse.
-
Go to Users and groups.
-
Click Add user/group.
-
Select a user and one of your App roles then click Assign.
-
The assigned users are now able to login to Lighthouse with the permission levels which that App Role/Lighthouse group grants them.