Skip to main content
All CollectionsValimail SuiteGeneral SettingsSSO for Enforce
Tutorial: Integrating Symantec Email Fraud Protection (EFP) with Microsoft Azure AD SSO
Tutorial: Integrating Symantec Email Fraud Protection (EFP) with Microsoft Azure AD SSO
Updated over a year ago

1. In the Azure portal, in the left navigation panel, click the Azure Active Directory icon.

2. Navigate to Enterprise Applications and then select the All Applications option.

a screenshot of a computer

3. Click the New application button on the top of dialog.

a screenshot of a computer

4. Click Non-gallery Application

a white paper with blue text

5. Enter the name of the application as you'd like it to appear to your users (e.g. Symantec EFP).

6. Click the Add button.

a screenshot of a computer

7. Click Getting started in the left navigation panel, then scroll down in the right navigation panel and click Configure single sign-on (required).

a screenshot of a computer

8. Click SAML in the right navigation panel.

a screenshot of a computer screen

9. Click the edit (pencil) button in the Basic SAML Configuration section.

a screenshot of a computer

10. In the Basic SAML Configuration screen, enter the values as indicated below:

Identified (Entity ID): https://app.emailfraudprotect.com

Reply URL (Assertion Consumer Service URL): https://app.emailfraudprotect.com/sso/consume

Relay State: <leave blank>

Logout URL: <leave blank>

a screenshot of a computer

11. Click the Save button.

12. After the configuration has been successfully saved, click Single sign-on in the left navigation panel again.

a screenshot of a computer

13. Click the edit (pencil) button in the User Attributes & Claims section in the right navigation panel.

14. Ensure only the claims shown below exist. Any additional claims should be deleted.

⚠️Important Points:

- the FirstName and LastName claim names are case-sensitive and must appear exactly as shown below for SSO to successfully work.

- the ...nameidentifier claim is a default and required by SAML 2.0. Microsoft Azure will not permit deletion of this claim.

a screenshot of a computer

15. Click on SAML-based sign-on in the breadcrumb menu and scroll down to the SAML Signing Certificate section.

16. Click the Federation Metadata XML Download link and save the metadata XML file.

a screenshot of a computer

17. Click on the Symantec EFP - Single sign-on link in the breadcrumb menu, then click Users and groups in the left navigation panel.

a screenshot of a computer

18. Be sure to add any users who should have access SSO access to Symantec EFP, including the administrator user with which you are currently logged into Azure AD.

⚠️SSO testing will fail unless you add your user during this step and also ensure the user has already been added as a user in Symantec EFP under Account Settings.

19. In a new browser tab/window, go to https://app.emailfraudprotect.com and login to Symantec EFP with your username and password.

20. Click on your account name and click Account Settings.

a screen shot of a computer

21. In the Authentication section, click the Setup button.

a screenshot of a computer

22. In the Single Sign-on Configuration section, scroll down to the IDP Metadata File section and click the Choose File button. Locate the XML file you saved in Step 16 and upload it.

a close-up of a box

23. Then click

a blue rectangle with white text

at the bottom of the page.

24. Testing IdP-initiated SSO: Open up a private/incognito window in your browser and go to the Microsoft Azure AD login portal, login with your Microsoft Azure AD credentials. If SSO was successful, you'll arrive at the Symantec EFP home page for your account.

25. Testing SP-initiated SSO: Open up a private/incognito window in your browser and go to https://app.emailfraudprotect.comand enter your Azure AD username (which is usually an email address). You will see the following message -- click Sign in with SSO. You will then be taken to the Azure AD login screen and the IdP-initiated login flow. If SSO was successful, you'll arrive at the Symantec EFP home page for your account.

a screenshot of a sign in
Did this answer your question?