Lookout Product Documentation

Find answers about using and optimizing Lookout products.

In Microsoft Azure Portal

  1. In a new browser tab, log in to your Azure portal.
  2. Select Azure Active Directory > Enterprise Applications.
  3. Select New Application.

  4. Select Create Your Own Application.
  5. Enter a display name (example: Lookout Isolation
  6. Select Integrate any other Application you don’t find in the gallery (Non-gallery), and select

    Create.

  7. Select Assign Users and groups.

  8. Select the Add user/group tab.
  9. Add an assignment.
    1. Click Users and groups to add all users who need access to isolation.
    2. Search for the user/group.
    3. Click the Select and Assign buttons.
  10. Select the Single sign-on > SAML box.

  11. Select Edit: Basic SAML Configuration.

  12. Under Identifier (Entity ID), select Add identifier.
  13. Copy the SP Entity ID value provided by Lookout and enter it in the Azure Identifier (Entity ID)

    field.

    https://sso.lookout-isolation.com/sso/saml/<TenantID>/
  14. Select Add Reply URL.
  15. Copy the SP Post Back URL and enter it into the Azure Reply URL (Assertion Consumer Service URL).
    https://sso.lookout-isolation.com/sso/saml/<TenantID>/login
  16. Click Save at the top of the panel.
  17. Configure the Relay State field for SP-initiated SAML assertions using these values.
    Set 4 as the Relay State.

    The Relay State instructs the application where to redirect users until after authentication is complete. The value is typically a URL or a URL path that takes users to a specific location in the application.

    Relay StateSP-initiated session
    4Silo Web Client (clientless)
  18. Set the Unique User Identifier as user.principalname.

  19. Select Edit in the SAML-based Sign-on Box 3: SAML Signing Certificate.

  20. In the Signing Option prompt, select Sign SAML Response.
  21. Save your changes.
  22. Click the Download link for the Certificate (Base64) in Box 3: SAML Signing Certificate.
    This will be uploaded to the Authentic8 Administration Console in a later step.