SAML Signing Certificate (found in the Manage>Single Sign-on)> SAML Provider X.509 Certificate.The image below is an example of where you can plug in the required details. Copy the following information and paste them into the appropriate field.It will depend on your configuration, but your selection should be the one that returns a user's email address. Important: For user.email, you may need to choose a different attribute that isn't erprincipalname. See below for the appropriate attributes to add: Azure has some default attributes set up, you will need to delete those and add the attributes above instead. Next, we need to edit the SAML Token Attributes.Grab the Highfive SSO URL from the domain dashboard and paste it into the field Reply URL in Azure.Once the new application is set up, please follow the instructions below. Our Highfive application will be under the non-gallery application set up.In Azure, you will need to set up a new enterprise application for Azure Active Directory.Click on the Authentication tab and then Start Configuration.Use regular mode for this process: Do not use Private or In Private mode as these are known to interfere with the process and generic errors.In your web browser, go to your Domain Dashboard.Google Chrome, Microsoft Edge, or Firefox web browser.This article will help you configure SSO specifically for Azure / Office 365. Highfive Admin users on the Standard or Professional plan can enable SSO, or single sign-on, which allows your users to log-in to Highfive with an identity management solution you've already set up.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |