Acronis - SSO configuration

Acronis - SSO configuration

Alert
Please note that this application has not been formally tested by Kelvin Zero Inc. It is provided solely as a reference guide. If you encounter any issues, kindly submit a ticket directly through the support desk.
Quote
This documentation provides a step-by-step guide to setting up Single Sign-On (SSO) for Acronis using MPAS. SSO simplifies user authentication by allowing access to multiple applications with a single set of credentials. This integration enhances security and improves user experience across your organization.
Warning
To set up Multi-Pass with Acronis, ensure you meet the following requirements:
- Acronis admin rights
- MPAS Admin rights
- Make sure that all users intended to use SSO in Acronis are registered in your IdP and have the necessary permissions to access Acronis.
Important: Custom elements in URLs (like realm names) are case sensitive. Make sure to match the exact casing from your environment.



Acronis - SSO configuration




Step 1 - Configure in Acronis (Service Provider)

  1. Sign in to the Acronis Cyber Protect Cloud Management Console as a Company Administrator.
  2. Go to Integrations and search for Microsoft Entra ID.
  3. Select the tile and click Configure to open the integration wizard.
  4. Follow the wizard until you reach the step that shows the SAML values to copy into your IdP.

SP Values
FieldValue
Identifier (Entity ID)Provided by Acronis in the integration wizard.
Reply URL (Assertion Consumer Service URL)Provided by Acronis in the integration wizard.
Logout URLProvided by Acronis in the integration wizard (required for Single Logout).

Detail Setup (IdP parameters required in Acronis)
FieldValue
Federation Metadata XMLUpload the IdP metadata XML (download it from your IdP).
Verification certificate (for signed requests)Upload the IdP verification certificate if you enforce signed SAML authentication.
Encryption certificate (for token encryption)Upload the IdP public certificate if enabling SAML token encryption.

Step 2 - Configure in Multi-Pass (Identity Provider)

  1. Open Multi-Pass Dashboard

  1. Select your tenant.
  2. Go to Integrations
  3. Click on Applications.

  1. Under the SAML, complete the form with the values provided by Acronis
FieldValue
NameAcronis Cyber Protect Cloud
SP Entity ID / Client IDUse the Identifier (Entity ID) from Acronis (see Step 1.2).
ACS URLUse the Reply URL (Assertion Consumer Service URL) from Acronis.
Logout URLUse the Logout URL from Acronis if you plan to enable Single Logout.
  1. Download the x.509 that you will need to upload in Acronis
  2. Click on add integration
  3. On the left side, Click on Advanced Console.
  1. Select Client, search for the integration you just created.
  2. Verify the fields below :
General settings
SettingValue
  Client ID
  Identifier (Entity ID) - Provided by Acronis in the integration wizard.
  Name 
  Acronis
  Description
  SSO integration
Always Display in UION

Access settings
SettingValue
Home URLhttps://ca.auth.kzero.com/realms/<TENANT_NAME>/protocol/saml/clients/<APP_NAME>
Valid Redirect URIs (ACS)Reply URL (Assertion Consumer Service URL) - Provided by Acronis in the integration wizard.
IDP-Initiated SSO URL Name<APP_NAME>

SAML Capabilities (defaults if not specified)
SettingValue
Force Name ID FormatON
Force POST BindingON
Include AuthnStatementON

Signature & Encryption (defaults if not specified)
SettingValue
Sign DocumentsOFF
Sign AssertionsON
  1. Now that you have checked the different parameters, change to the tab called “Keys”.
    1. Make sure that both parameters are switched to OFF.
  2. Now go to the “Advanced” tab.
    1. The field “Assertion Consumer Service POST Binding URL” must equal the Valid Redirect URIs (ACS).

Step 3 - Provisioning / Testing

  1. In Acronis, click Activate to enable Entra SSO; you can later review or modify integration settings, and download/upload metadata and certificates.
  2. Test SP-initiated SSO: from cloud.acronis.com or your datacenter URL, sign in via SSO.
  3. Test IDP-initiated SSO: launch from Entra (MyApps / M365 app launcher). Note: IDP-initiated SSO is not compatible if you enforce signed SAML authentication.
  4. Single Logout (SLO): to enable both SP- and IDP-initiated SLO, make sure the Logout URL is set in your IdP configuration for the Acronis app.


    • Related Articles

    • D2L Brightspace - SSO Integration

      This application has not been formally tested by Kelvin Zero Inc. It is provided solely as a reference guide. If you encounter any issues, kindly submit a ticket directly through the support desk. This documentation provides a step-by-step guide to ...
    • Mulesoft - SSO Integration

      This application has been formally tested by Kelvin Zero Inc. This documentation provides a step-by-step guide to setting up Single Sign-On (SSO) for Mulesoft using Multi-Pass. SSO simplifies user authentication by allowing access to multiple ...
    • Azure EAM - MPAS integration

      This documentation has been tested and approved by Kelvin Zero's team This document will outline the steps required to enable MPAS as an external authentication method in Microsoft Entra ID. To set up Multi-Pass, ensure you meet the following ...
    • Checkpoint - SSO Configuration

      This documentation has been tested and approved by Kelvin Zero's team This documentation provides a step-by-step guide to setting up Single Sign-On (SSO) for Checkpoint using MPAS. SSO simplifies user authentication by allowing access to multiple ...
    • Pipedrive – SSO configuration

      This application has been formally tested by Kelvin Zero Inc. This documentation provides a step-by-step guide to setting up Single Sign-On (SSO) for Pipedrive using Multi-Pass. SSO simplifies user authentication by allowing access to multiple ...