Microsoft Entra ID and Single Sign-On
This guide will walk you through integrating Microsoft Entra ID with the CyberPilot platform, so you can automatically sync users and enable Single Sign-On (SSO).
With this setup, users in selected Microsoft Entra groups are:
-
Automatically added to the CyberPilot platform
-
Able to log in via SSO using their Microsoft credentials
-
Removed from CyberPilot when they are removed from the synced Entra group (except Admins)
✅ You only need to go through this process once. After that, your user access will stay up to date automatically.
The steps are:
- Create Entra ID Group(s) for CyberPilot
- Verify required user properties
- Create a CyberPilot enterprise application
- Configure API permissions
- Create client secret
- Configure AD Sync in CyberPilot
- Configure SSO in Microsoft Entra ID
- Configure SSO in CyberPilot
Step 1: Create Entra ID Group(s) for CyberPilot
We recommend creating dedicated groups for CyberPilot training. This makes it easier to control who gets access.
-
Click Groups > New group
-
Set:
-
Group type: Security
-
Name: e.g., CyberPilot Awareness
-
Membership type: Dynamic User (or Assigned if preferred)
-
-
Add a dynamic query (e.g., filter by
userType
, exclude service accounts) -
Save the group
-
After creating the group, note down the Group Object ID — you’ll need it later.
-
Confirm your email is a member of the group
Step 2: Verify required user properties
CyberPilot syncs the following properties from Microsoft Entra ID:
-
Required:
User Principal Name
,First Name
,Last Name
,Email
-
Optional (recommended for better reporting):
Company Name
,Department
,Manager
,Country
,Job Title
,Mobile Phone
,Office Location
,Preferred Language
If Preferred Language
is set, it determines the user’s default language in CyberPilot. Users can override this manually.
Step 3: Create a CyberPilot enterprise application
-
Go to Enterprise Applications in Entra admin center
-
Click + New application > Create your own application
-
Choose Non-gallery application and give it a name
-
After creation:
-
Click Assign users and groups
-
Add the Entra group you created earlier
-
Step 4: Configure API permissions
-
Go to App registrations > [Your CyberPilot App]
-
Click API permissions > Add a permission > Microsoft Graph
-
Select:
-
Application permissions
-
Directory.Read.All
-
GroupMember.Read.All
-
User.Read.All
-
-
-
Click Add permissions, then Grant admin consent
Step 5: Create client secret
-
Go to your CyberPilot App in App registrations
-
Click Certificates & secrets > New client secret
-
Set a description and expiration (24 months recommended)
-
Click Add
-
Copy and save:
-
Client Secret Value (you’ll only see this once)
-
Client Secret ID
-
Application (Client) ID
-
Directory (Tenant) ID
-
Step 6: Configure AD Sync in CyberPilot
-
Log in to your CyberPilot subdomain:
https://yourcompany.app.cyberpilot.io
-
Go to Settings > Account > Integrations > Microsoft
-
Enter:
-
Client ID
-
Client Secret
-
Tenant ID
-
- Enable the Entra ID Sync toggle
- Add a new mapping:
-
Enter the Group Object ID
-
Choose where users are mapped (account or branch)
-
(Optional) Set default language for users in this group
-
- Click save
- Use "Sync now" to test that it works
Step 7: Configure SSO in Microsoft Entra ID
-
Go to Enterprise applications > [Your CyberPilot App]
-
Select Single Sign-On > SAML
-
In Basic SAML Configuration, edit:
-
Identifier:
https://login.app.cyberpilot.io/realms/your-subdomain
-
Reply URL:
https://login.app.cyberpilot.io/realms/your-subdomain/broker/saml/endpoint
-
-
Save the settings
-
Copy the App Federation Metadata URL and save for the next step
Step 8: Configure SSO in CyberPilot
-
Go to Settings > Account > Integrations > SSO
-
Enable Use SSO
-
Select Import configuration
-
Paste the App Federation Metadata URL
-
Click Save
-
Test login at your subdomain using SSO
Step 9: Let us know you're done
Please notify your CyberPilot customer success manager once setup is complete so we can finalize onboarding.