Using Striim Cloud with Microsoft Entra ID
The Microsoft Entra application gallery is a collection of software as a service (SaaS) applications that have been pre-integrated with Microsoft Entra ID (formerly Azure Active Directory ID). The collection contains thousands of applications that make it easy to deploy and configure single sign-on (SSO) and automated user provisioning. Striim Cloud is available in the Microsoft Entra application gallery as a prebuilt identity-ready application.
When you integrate Striim Cloud with Microsoft Entra ID, you can control in Microsoft Entra ID who has access to Striim Cloud, enable your users to be automatically signed-in to Striim Cloud with their Microsoft Entra accounts, and manage your accounts in one central location.
Limitations
Note the following limitations to the integration:
If you make changes in Striim Cloud, those changes will not be reflected in Microsoft Entra. You may receive a warning in the provisioning logs page about what attributes was changed. The scenario can happen with any individual field modification such as firstname, lastname or email.
When you remove a user from the Striim Cloud application alone, it gets permanently deleted. To bring back the user, you must remove the user completely from Microsoft Entra, create a new user, and associate this newly created user to the Entra application.
Adding Striim Cloud from the Microsoft Entra Gallery
Sign in to the Microsoft Entra admin center as at least a Cloud Application Administrator.
Browse to Identity > Applications > Enterprise applications > New application.
In the Add from the gallery section, type Striim in the search box.
Select Striim Cloud from the results panel and then add the app. Wait a few seconds while the app is added to your tenant.
Configuring Microsoft Entra SSO for Striim
Sign in to the Microsoft Entra admin center as at least a Cloud Application Administrator.
Browse to Identity > Applications > Enterprise applications > Striim Cloud > Single sign-on.
On the Select a single sign-on method page, select SAML.
On the Basic SAML Configuration section, the application is pre-configured and the necessary URLs are already pre-populated with Azure. You can save the configuration by clicking Save.
The Striim Cloud application expects the SAML assertions in a specific format, which requires you to add custom attribute mappings to your SAML token attributes configuration. The following are a list of default attributes.
userName
emails[type eq “work”].value
name.givenName
name.familyName
externalId
The values for these mapping are pre-filled. You can verify or modify these mappings.
On the Set up single sign-on with SAML page, in the SAML Signing Certificate section, find Certificate (Base64) and select Download to download the certificate and save it on your computer.
On the Set up section, copy the Login URL and Microsoft Entra Identifier values.
Configuring Striim Cloud to trust Microsoft Entra ID as an IdP
Note
You need to have Striim admin privileges to perform this procedure.
Log into your Striim Cloud account.
From the Striim Console page, select User Profiles at the top right of the screen.
Choose Configure SSO.
In the Single sign-on section paste the values from Microsoft Entra.
Click Update configuration.
Enable the Single sign-on (SSO) toggle near the top of the page.
Test logging in to your Striim Cloud account through Microsoft Entra. Logout then go to the login page and select Sign in with SAML. You will be logged in through Microsoft Entra.
Logging into Striim using SSO
Users can access Striim Cloud through the Striim Cloud login page or through Microsoft Entra.
To access via the Striim login page, click Use SSO. The user is redirected to the IdP login URL to complete authentication.
To access via Microsoft Entra, select the Striim Cloud app in the Microsoft Entra Gallery and federate into Striim.