Overview
This article provides a step-by-step guide for configuring Single Sign-On (SSO) for the VAST Management GUI using SAML with Microsoft Entra ID (formerly known as Azure Active Directory). By following these instructions, you will enable users to log in to the VAST Management GUI securely using their existing corporate credentials managed within your Entra ID tenant.
The process involves two main parts: first, configuring a new enterprise application within Microsoft Entra ID, and second, applying the necessary settings within the VAST Management GUI. It covers the specific settings for basic SAML configuration, user attributes, and role claims to ensure a successful and seamless integration.
IdP Configuration
Configuring SAML takes two steps; it’s easiest to start at the Identity Provider. The following steps should be done in Microsoft Entra ID (formerly known as Azure Active Directory).
Pick a name for the integration. This can reference the identity provider, such as “Entra”, or it can be the name of your domain or business, such as “acme.com”.
Basic SAML Configuration
Create an “Enterprise Application” with the following configuration:

SAML Config
Configuration | Value |
|---|---|
Identifier (Entity ID) |
|
Reply URL (Assertion Consumer Service URL) |
|
Sign on URL |
|
Relay State (Optional) | empty, not important for our config |
Logout Url (Optional) | empty, not supported at this time |
Replace vmsip with the actual VMS IP address.
ℹ️ Note
This must be the VMS VIP. A DNS name will not work at this time.
Note that the string format is exact – you must provide it as shown above, including the trailing slash before the? denoting the beginning of the HTTP query string parameters. SAML uses many of these values to ensure that its requests and responses are being sent to the correct endpoint.
Attributes & Claims
These are necessary to fit the SAML Response into a format that the VAST Management GUI will understand.

Attributes & Claims
The following is an example of the Edit page for the Attributes & Claims section:

Required claim
Unique User Identifier
The Unique User Identifier is unique and should look like the following:

Manage Claim
This is the only value with a Name and Namespace that you cannot change.
Other claims
For the remainder of the claims, ensure there is no value in the Namespace field:

Manage Claim contact info
Required claims are:
username - This can be any string value from the user’s directory entry that is unique.
email - This should be an e-mail address, whether the On Premises SAM account or “Other Email”
ℹ️ Info
At this time, “First Name” and “Last Name” are not updated upon login.
The “roles” claim is optional, but highly recommended. If the “roles” claim is not defined, VMS will assign the “read-only” role to the user upon login.
For role mapping in this simple example, it’s possible to hard-code a “role” into the SAML login, and then control access to the application (and therefore VMS) within Entra ID.

Claim roles
The “Source attribute” field will allow you to type a free-form text string. When you press enter, it wraps the text you wrote in quotation marks (“administrators”), which signifies that Entra’s SAML response will send this string verbatim, rather than taking something unique about the user.
VMS will compare that string against all the roles it knows about and apply the role to the user upon login.

VMS account attribute
VMS Configuration
Within the VAST Management GUI, three pieces of information are required.
The name of the integration from the first step of this document. In the examples provided above, “entra” was used.
The “App Federation Metadata URL” from Entra ID in section 3, “SAML Certificates”.
Alternatively, it is possible to copy the Metadata XML from that URL.
The “Microsoft Entra Identifier” from Entra ID in section 4, “Set up (application name)”.

SAML certificate
General
These values will be entered into a new SAML configuration within VMS. In “Identity Provider name” enter the value as shown.
In “Identity Provider entity ID” enter the “Microsoft Entra Identifier”.
Choose “Force Authenticate” if you want your users to always go to the Identity Provider, even if they are already signed in.

API Access Key
Metadata
If the VAST VMS node is able to reach the URL defined in Entra’s “App Federation Metadata URL field, then the “Metadata URL” can be the URL.

Metadata URL
If the VAST VMS node is air gapped or otherwise cannot reach the URL, open the URL in a browser that can reach it, and copy the XML contents into the large text field provided.

Paste here
Press the “Set” button at the bottom of the form to finish the process. A new button should be present in the login page, allowing for SSO Login with your provider, as named above.

VMS login screen
ℹ️ Info
If you want to change the name of the provider displayed, you will need to delete and re-create the SAML integration, as well as update the values in the URLs within Entra ID.