How to setup Microsoft Entra SSO with Veritas Alta Archiving SSO

Article: 100041167
Last Published: 2025-02-11
Ratings: 9 1
Product(s): Veritas Alta Archiving, Veritas Alta eDiscovery, Veritas Alta Surveillance

Description

The following steps will be performed in the Microsoft Entra admin center as well as the Arctera insight Management Console to configure SSO.  

1. Create a New application under Enterprise applications

2. Choose to Create your own application

3. Enter a name for the application and choose option (Non-gallery)

4. Click Create

5. Select Single Sign-on then SAML

6. Choose Edit in the Basic SAML Configuration section

7. Enter the Identifier (Entity ID), Reply URL, and Sign on URL using the values for the correct data center. See tables below for this information. For Sign on URL the value should include the CID value. This can be found in the Arctera insight Management Console under Policy Management > Authentication Management.

7A - The Customer ID (CID) will need to be generated in the Arctera insight Management Console.  It's an auto-generated hash value which is unique to each customer instance after changing the Authentication Type from Cloud Archive credentials.  To access it, login to the Arctera insight Management Console  > Policy Management > Authentication Management node.  Once selected, it will generate the unique Customer ID. 

  1. Set the Authentication Type to Single Sign-on - SAML 2.0 based
  2. Configure the other options as needed
  3. Click Save to continue to the next step

8. Return to Microsoft Entra admin center and enter the Sign on URL in the following format using the format Datacenter URL + /?CID_VALUE

Example:  https://personal.us3.archive.veritas.com/?CID=12345633-2acb-4540-b9e4-eb2626123456

9. Save the configuration and close the Basic SAML Configuration window

10. Download the Base64 certificate from the SAML Certificates section.  This will be uploaded to the Arctera insight Management Console SSO configuration

11. Copy the Login URL from the Setup up APP_NAME section. This will be used to complete the configuration in the Arctera insight Management Console

12. Return to the Arctera insight Management Console and upload the downloaded certificate to the Upload Your Public Key section

13. Enter the copied Login URL into the Validate Relying Trust section and click Validate 

14. Click Save and then Activate SSO to complete the configuration

Note: Users or groups must be added to the created application in the Microsoft Entra admin center to allow them to utilize SSO.  

Sign-on URL paths - 

Datacenter URL
USW01 https://personal.us.archive.veritas.com/
USW03 https://personal.us3.archive.veritas.com/
EUW01 https://personal.eu.archive.veritas.com/
AUE01 https://personal.ap.archive.veritas.com/
CAC01 https://personal.ca1.archive.veritas.com/
UKS01 https://personal.uk1.archive.veritas.com/

 

Identifier (Entity ID), Reply URL

Datacenter URL
USW01 https://auth.lax.archivecloud.net
USW03 https://auth.us3.archivecloud.net
EUW01 https://auth.ams.archivecloud.net
AUE01 https://auth.syd.archivecloud.net
CAC01 https://auth.ca1.archivecloud.net
UKS01 https://auth.uk1.archivecloud.net

 

NOTE: SSO access for Personal Archive is the default use of the Application Login URL. SSO can also be enabled for Management and  eDiscovery by Arctera Support. 

***Create a case with Arctera Support to have SSO access enabled for Management or eDiscovery***

Once enabled, the SSO URL’s for Management and/or eDiscovery will have the CID at the end, as it is with the Personal Archive SSO URL.  Please see the examples below:

  • https://admin.us.archive.veritas.com?CID=###########
  • https://discovery.us.archive.veritas.com?CID=###########

References

JIRA : CFT-3947

Was this content helpful?