Azure Active Directory

Security Requirements and Controls

LogScale can integrate Azure Active Directory (Azure AD) for identity and access management. Find detailed steps for creating an Azure application, configuring SAML-based single sign-on, and setting up group synchronization between the two platforms. For cloud customers, the integration process requires working with Support to complete the configuration while following specific requirements for security controls and permissions.

Azure Active Directory is Microsoft's enterprise cloud-based identity and access management (IAM) solution. It can be used to access your LogScale repositories. Microsoft365 also uses this interface, for more information see Tag Fields Created by Parser microsoft365.

Integrating Azure AD with LogScale

To integrate Azure AD with LogScale, three main operations are required:

  1. Create Azure application

  2. Set up LogScale IDP configuration

  3. Set up group mapping (optional).

Step 1 — Create Azure application
  1. Sign in to the Azure portal and choose the Azure Active Directory card:

    Screenshot of the Azure portal home page showing various service cards, with the Azure Active Directory card highlighted. The Azure Active Directory card appears as a rectangular tile with its logo (a stylized user silhouette inside a key-shaped border) and is the first service that needs to be selected when beginning the LogScale SAML configuration process with Azure AD. This is the initial navigation step where administrators click to access identity and access management settings.

    Figure 41. Azure Active Directory


  2. Open Groups and click New group: here you create the groups that will be added later in LogScale for synchronization. For example, you can create a logscale_admin group.

    Screenshot of the Azure Active Directory Groups management interface showing the process of creating a new group for LogScale integration. The image displays the Azure portal's Groups page with the 'New group' button highlighted, which administrators need to click to create groups such as 'logscale_admin'.

    Figure 42. Groups in Azure AD


  3. Open Enterprise Applications and click New application:

    Screenshot of the Azure Active Directory Enterprise Applications interface showing the page where administrators need to click the 'New application' button to begin creating a custom application for LogScale integration. The image displays the Azure portal's Enterprise Applications management screen, which is a crucial step in the integration process as it initiates the creation of an application that will establish the SAML connection between Azure AD and LogScale for user authentication and single sign-on capabilities.

    Figure 43. Enterprise Applications in Azure AD


  4. From the Browse Azure AD Gallery page:

    • Click + Create your own application

    • Enter a name for the app, e.g., logscale_idp

    • Choose Integrate any other application you don't find in the gallery option

    Screenshot of the Azure AD application creation interface showing the 'Create your own application' dialog. The form displays a text field for entering an application name (example shown: 'logscale_idp') and radio button options for integration types, with 'Integrate any other application you don't find in the gallery' selected. This interface appears during step 1 of the Azure AD integration with LogScale, where administrators must create a custom application to establish SAML authentication between Azure AD and LogScale.

    Figure 44. Create your application in Azure


  5. Click Create: your application is now added successfully.

Step 2 — Set up LogScale IDP configuration
  1. In the new application page, click Single sign on and then choose SAML as your single sign-on method:

    Screenshot of the Azure portal showing the single sign-on method selection page for the LogScale application. The interface displays a list of authentication options with SAML highlighted and selected from among choices like password-based, OIDC, and other protocols. This is a critical step in configuring Azure Active Directory as an identity provider for LogScale, where administrators must select SAML to proceed with the federation setup.

    Figure 45. Select SAML single sign-on


  2. In the Basic SAML Configuration window:

    • Set Identifier (Entity ID) to $YOUR_LOGSCALE_URL/api/v1/saml/metadata

    • Set Reply URL to $YOUR_LOGSCALE_URL/api/v1/saml/acs

    • Set Sign on URL if you want to perform identity provider-initiated single sign-on.

    • PopulateRelay State with an integration URL to instruct the application where to redirect users after authentication e.g. the URL to a specific location within the application.

    Screenshot of the Azure AD SAML configuration interface showing the 'Basic SAML Configuration' form where administrators must enter critical connection parameters for LogScale integration. The form displays fields for 'Identifier (Entity ID)', and optional fields for 'Sign on URL' and 'Relay State'. These parameters establish the trust relationship between Azure AD as the identity provider and LogScale as the service provider, enabling proper SAML authentication flow between the two systems.

    Figure 46. Basic SAML Configuration settings


  3. In the SAML-based Sign-on page of your newly created application, copy Login URL, Azure ID Identifier and the text of the Certificate (Base 64) and note them down, as you will need to copy them later in LogScale.

    Screenshot of the Azure AD SAML-based Sign-on information page showing the essential federation parameters that administrators need to copy for LogScale configuration. The image displays the three critical values that must be collected: the 'Login URL' (SAML single sign-on service URL), the 'Azure AD Identifier' (issuer URL), and the 'Certificate (Base 64)' text that contains the authentication certificate.

    Figure 47. SAML-based Sign-on information


Step 3 — Set up group mapping (optional)
  1. Click + Add a group claim and select which groups you want to be associated with the users e.g., Security Groups:

    Screenshot of the Azure AD group claims configuration interface showing the '+ Add a group claim' button that administrators must click to configure group membership synchronization with LogScale. The image displays the UI where security groups and other user group associations are selected for inclusion in the SAML token. This critical step enables mapping Azure AD group memberships to LogScale permissions, allowing for automatic role assignment when users authenticate. The interface shows options for selecting the type of groups to include, with Security Groups typically being selected for role-based access control in LogScale.

    Figure 48. Add a group claim


    From this same page:

    • Click the first claim Unique User Identifier to assign users to LogScale on the IDP side.

    • Copy and note down the http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress claim as you will need it later to synchronize your group in LogScale.

  2. In the Manage claim window, ensure that Name identifier format and Source are set as in figure below:

    Screenshot of the Azure AD 'Manage claim' configuration window showing the settings for user identity claims that must be properly configured for LogScale integration. The image displays the crucial configuration form where 'Name identifier format' and 'Source' fields need to be set to specific values as shown in the figure.

    Figure 49. Manage claim


  3. Still in the Manage claim window, click under Scoped Groups to select the new group and assign user type (e.g. Members, Admin) and user.mail as the value:

    Screenshot of the Azure AD group configuration interface showing the process of assigning user types to Azure AD groups for LogScale integration. The image displays the section where administrators click under 'Scoped Groups' to select newly created groups and specify user types (Members or Admin) with 'user.mail' set as the attribute value.

    Figure 50. Add user types to group


Configuring LogScale to use Azure AD

You finished configuring Azure AD to work with LogScale. Now, you need to configure LogScale to work with Azure AD.

  1. Go to LogScale and from your avatar profile click Organization SettingsIdentity ProvidersAdd IDP Configuration pull-down menu → SAML 2.0

  2. Click + Add domain to choose which email domain your configuration applies to.

  3. In the Configure SAML 2.0. integration page, fill in the information as required (see an example in Figure 51, “Example Configuration in LogScale”) . In particular:

    • Name of the configuration

    • SAML metedata endpoint. If available, paste here your SAML provider metadata endpoint link to autofill most of the fields listed below.

    • Identity provider single sign-on URL — enter the value of Login URL that you have previously copied from Azure AD (as seen in Figure 46, “Basic SAML Configuration settings”).

    • Identity provider entity ID — enter the value of Azure AD identifier that you have previously copied from Azure AD.

    • X.509 certificate — paste the text of Certificate (Base 64) found in Azure AD, which you should have previously downloaded and copied.

    • Enable debugging — recommended, allows to store debug logs in a LogScale repository to monitor the activity between the IDP and LogScale, see LogScale Debug Logs.

    • User attribute — populate with emailaddress that you have previously copied from Azure AD.

    • Let identity provider handle group memberships in Falcon LogScale — check the box and populate the field with http://schemas.microsoft.com/ws/2008/06/identity/claims/groups (this is needed to pass AD Groups you've previously created to LogScale).

    • Default IDP — check the box if you want to set the Azure AD as the primary external Identity Provider. In this case it is good practice to disable other external identity providers that you are not using; you can do so individually on each provider from Identity Providers.

    • Automatically create users on login — check the box to allow users to appear in LogScale after their first sign-in.

    Screenshot of the LogScale SAML 2.0 integration configuration form showing the fields that must be populated with Azure AD information to establish the identity provider connection. The image displays the comprehensive configuration interface where administrators must enter numerous parameters including the identity provider name, SAML metadata endpoint, single sign-on URL, entity ID, X.509 certificate, user attribute mapping, and group membership settings. The form also shows checkboxes for enabling debug logging, setting this as the default identity provider, and automatically creating users on login.

    Figure 51. Example Configuration in LogScale


Group Synchronization

After LogScale has been configured to use Azure AD (see previous section), you need to align the Azure AD groups' Object ID in LogScale.

  1. Go back to Azure AD and from your group's page, copy the Object ID:

    Screenshot of the Azure AD group properties page showing where to locate and copy the Object ID that will be used for group synchronization with LogScale. The image displays the Azure AD interface where administrators can view group details, with the Object ID field highlighted or visible as a unique alphanumeric identifier. This Object ID is a critical value that must be copied exactly and pasted into LogScale's group configuration to establish the correct mapping between Azure AD groups and LogScale groups.

    Figure 52. Copy Object ID from Azure AD


  2. In LogScale, first create the group manually (provide a name that is similar to the group name set in Azure AD) and then paste the Object ID into the Mapping Name field, under the External provider tab:

    Screenshot of the LogScale group configuration interface showing the External provider tab where an Azure AD Object ID is being entered into the Mapping Name field. This interface demonstrates how to link Azure AD groups to LogScale groups by pasting the Object ID copied from Azure AD into the appropriate field in LogScale's group settings, which is a crucial step in the group synchronization process between Azure AD and LogScale.

    Figure 53. Mapping Name


Refer to Azure portal for more information on SAML 2.0 integration.

Also refer to Configure SAML for LogScale Self-Hosted documentation section.

To configure LogScale on your own server, go to the top of this page on Configuring LogScale.

See the Azure Active Directory Documentation for more information on Azure AD.