Single Sign-on Setup

Introduction

If your company uses Microsoft Active Directory (on-prem), or Entra ID (cloud-based), or any other identity provider (IdP), whether on-prem or cloud-based, you can enhance security and make life easier for yourself and your portal users with our single sign-on (SSO) support. We support all common identity providers either directly or through generic SAML 2.0.

When you add a portal user and assign them a single sign-on option, there is no password to worry about – and if your identify provider supports IdP-initiated login, they will not even need to know their username.

We currently support:

  • Microsoft 365 / Entra ID (formerly Azure AD)

  • Active Directory Federation Services (AD FS)

  • Okta

  • SAML 2.0 (any other identity provider using our generic SAML integration)

The procedures in this section work well for a small number of users entered manually. If you need to assign a large number of users using SCIM, refer to SCIM.

Microsoft 365 / Entra ID

Microsoft 365 supports integration with your in-house Active Directory, enabling users to access Microsoft 365 services using their standard AD login credentials. This connection is established through SAML authentication.

To add a Microsoft 365 login, you simply pick it as the sign-on method in the portal when adding a new user without any further configuration. The portal menu option to add a new user is Logins > User Logins.

Microsoft 365 login requires that users are allowed to consent to apps. You can enable this under Users and groups / User settings in the Azure Active Directory (Entra ID) Admin Center. Once all portal users have logged into the portal, the option to consent to apps can be disabled without affecting future logins.

Refer to Entra ID Support for more information.

Entra ID without Microsoft 365

It is possible to login using Entra ID without using Office 365.

Prerequisites
  • A user account in the ABR portal, with sufficient rights to configure SSO:

    • Read-only view: OFF

    • Manage Settings: ON

    • Manage portal users: ON

  • A valid account for the Entra ID portal as well as the ABR portal. Make sure you are logged-in to both portals - you will switch between them during the configuration procedure.

  • All your users who intend to login using Entra ID SSO must have their accounts and/or email addresses entered into your Entra ID portal. This makes them available to be assigned to the Admin By Request app once it is configured.

Procedure

The tasks below are labeled the same as the sections in the ABR portal. Each task comprises a number of steps.

Test your SSO configuration by logging-in as several users and verify that they can login successfully.

Active Directory Federation Services (ADFS)

Active Directory Federation Services (ADFS) is a Windows Server feature that enables your in-house Active Directory users to authenticate with external web applications via SAML, allowing them to log in using their regular AD credentials.

Prerequisites
  • A user account in the ABR portal, with sufficient rights to configure SSO:

    • Read-only view: OFF

    • Manage Settings: ON

    • Manage portal users: ON

  • A functional ADFS setup within your Windows server environment, including administrative access to the ADFS server.

Make sure you are logged-in to both the ADFS server and the ABR portal - you will switch between them during the configuration procedure.

Procedure

The tasks below are labeled the same as the sections in the ABR portal. Each task comprises a number of steps.

Test your SSO configuration by logging-in as several users and verify that they can login successfully.

Okta

Okta is an identity management platform that can connect your in-house Active Directory to external web applications using SAML. This integration allows users to authenticate with their usual AD credentials when accessing the portal.

Prerequisites
  • A user account in the ABR portal, with sufficient rights to configure SSO:

    • Read-only view: OFF

    • Manage Settings: ON

    • Manage portal users: ON

  • A valid account for the Okta portal as well as the ABR portal. Make sure you are logged-in to both portals - you will switch between them during the configuration procedure.

  • All your users who intend to login using Okta SSO must have their accounts and/or email addresses entered into your Okta portal. This makes them available to be assigned to the Admin By Request app once it is configured.

Procedure

The tasks below are labeled the same as the sections in the ABR portal. Each task comprises a number of steps.

Test your SSO configuration by logging-in as several users and verify that they can login successfully.

Generic SAML

Security Assertion Markup Language (SAML) is an open standard that allows your in-house Active Directory to authenticate users with external web applications. This enables users to log in to the portal using their standard AD credentials.

If you are not using O365, Azure AD, AD FS or Okta, we do support SSO with any SAML identity provider. This means you can easily integrate with any SAML single sign-on provider, such as DUO, F5, Netscaler, One login, Idaptive or RSA.

Prerequisites
  • You need valid accounts for both the ABR portal and the SAML portal you intend to use. Make sure you are logged-in to both portals - you will switch between them during the configuration procedure.

  • Check login requirements for users - it's likely that all your users who intend to login using SAML must have their accounts and/or email addresses already entered into that system and available to be assigned to the Admin By Request app once it is configured.

Procedure
  1. To set up generic SAML SSO, you simply create a SAML single sign-on domain with Generic SAML as the provider in the Single Sign-on Setup page in your ABR portal.

  2. If your IdP supports automatic configuration, download our metadata at https://www.adminbyrequest.com/samlmeta.
    If not, then use the following settings:

    • Consumer URI: https://www.adminbyrequest.com/saml

    • Service Provider Entity ID: https://www.adminbyrequest.com/samlmeta

    • NameID format: E-mail address

  3. After setting up the service provider, download the IdP / Federation metadata as XML and upload it to on the Single Sign-on Setup page and assign the login to users.

Questions?

If you have questions not answered on this page, please contact us using the chat or the contact menu at the top.