Configuring Reverse Proxy for Microsoft 365 with Microsoft Entra ID Authentication - General workflow
Describes general instructions for configuring Microsoft 365 for use with Forcepoint Data Security Cloud | SSE when Microsoft 365 uses Microsoft Entra ID as the identity provider.
To successfully create and configure the reverse proxy application, you must complete the following procedures:
- Configure Microsoft 365 Application Instance in Forcepoint Data Security Cloud | SSE
with Azure AD Reverse Proxy as the cutoff method. Refer to Creating Microsoft 365 application in Forcepoint Data Security Cloud | SSE.
- Setup a CNAME for your AzureAD RP domain at your DNS provider as specified in the Azure AD Reverse Proxy Setup page of your Microsoft 365 instance in Forcepoint Data Security Cloud | SSE.
- Obtain and upload an SSL certificate for your Azure AD RP domain to Forcepoint Data Security Cloud | SSE. Refer to Configuring AzureAD reverse proxy certificate.
- Create a SAML reverse proxy application in Azure and configure Forcepoint Data Security Cloud | SSE as a SAML SP. Test the application. Verify that the traffic is redirected. Refer to Microsoft Entra ID: Configuring Forcepoint Data Security Cloud | SSE as a SAML SP.
- Configure a conditional access policy. Define the criteria to control which devices access your Office 365 services. Refer to Configuring conditional access policy in Microsoft Entra ID.
- Validate the conditional access policy. Verify that the traffic from unmanaged devices cannot access your Office 365 services. Refer to Validating the conditional access policy.