Skip to main content

Foundational Task: RBAC and SSO

Updated over a month ago

Inforcer supports SSO integration for multiple tenants with Microsoft 365 using SAML. This allows client administrators to authenticate using their existing Microsoft credentials and self-provision access without needing manual onboarding from an account manager.

By setting up SSO in inforcer, you ensure that user access to Inforcer inherits the same identity security controls applied within Microsoft Entra ID.

Why SSO Matters


  • Centralized Identity Management

Users authenticate with their Microsoft 365 credentials, eliminating password sprawl and reducing credential risk.


  • Stronger Security

SSO enforces Microsoft security controls including:

  • Multi-Factor Authentication (MFA)

  • Conditional Access policies

  • Risk-based sign-in

  • Identity Protection policies

Access to Inforcer is therefore governed by the same Zero Trust principles protecting the Microsoft tenant.


  • Seamless User Experience

One login session grants access to:

  • Microsoft 365 workloads

  • Inforcer platform

No additional passwords. No duplicate identity stores.


  • Rapid Deprovisioning

Disable a user in Microsoft 365, and their Inforcer access is immediately revoked.

This ensures proper identity lifecycle management and supports joiner/mover/leaver processes.


  • Compliance & Auditing

Because authentication is centralized:

  • Sign-in logs remain in Entra ID

  • Access is governed by Conditional Access

  • RBAC aligns to least-privilege principles

  • Audit trails support regulatory requirements

SSO Setup Overview (SAML)

Important Design Notes

In the demonstration video:

  • A security group named inforcer-sso is used to scope access.

  • This is ideal for tenants with Entra P1/P2 licensing.

  • For Microsoft 365 Business Standard tenants, assignment must be done per-user (group-based app assignment is a licensing limitation).

  • Breakglass Access: In my professional opinion, it's best practice to keep one user as an admin and not integrate into SSO. This ensures ease of access if the SAML Certificate expires and users lose access.


    How to Setup SSO Walkthrough

Thinking through RBAC and the Roles:

Microsoft recommends RBAC as a foundational security best practice for all cloud environments, including Microsoft 365

Think in terms of operational separation:

1️⃣ Architect Role (Administrative)

Intended For:

  • Security Architects

  • Senior Engineers

  • Platform Owners

Capabilities:

  • Create and modify baselines

  • Define best practices

  • Manage tenant configurations

  • Assign roles to other users

  • High-level access decisions

This role carries strategic control over policy design and governance.


2️⃣ Engineering Role (Operational)

Intended For:

  • Day-to-day operations teams

  • Deployment engineers

  • Technical support teams

Capabilities:

  • Align tenants to baselines

  • Push policies

  • Review configuration drift

  • Execute operational changes

Limitations:

  • Cannot create or modify baselines

  • Cannot change global architecture decisions

This enforces separation of duties between design and execution.


3️⃣ Read-Only Role (Reporting & Business Visibility)

Intended For:

  • Technical Account Managers (TAMs)

  • Sales Engineers

  • Business Operations

Capabilities:

  • View configurations

  • Generate reports

  • Review compliance posture

Limitations:

  • No modification rights

  • No baseline changes

  • No tenant configuration changes

This enables business insight without operational risk.

Testing out the SSO and discussing RBAC



Creating New RBAC Roles and Modifying Users

Did this answer your question?