SSO/Office365: Difference between revisions
Jump to navigation
Jump to search
No edit summary |
No edit summary |
||
Line 16: | Line 16: | ||
*Click edit under '''Basic SAML Configuration''' | *Click edit under '''Basic SAML Configuration''' | ||
**Delete all info under '''Identifier (Entity ID)''' | **Delete all info under '''Identifier (Entity ID)''' | ||
***Enter the URL ''' | ***Enter the URL '''https://{URL<nowiki/>}/{CustomerID}''' replace {CustomerID} with you number. This can be found in the configurator program under license info | ||
**Enter this in '''Reply URL (Assertion Consumer Service URL)''' ''' | **Enter this in '''Reply URL (Assertion Consumer Service URL)''' '''https://{URL<nowiki/>}/{CustomerID}/SSO/AssertionConsumerServiceAzureAd.aspx''' | ||
** | ** | ||
*Open SQL Management Studio on the UMS Server and connect to the database | *Open SQL Management Studio on the UMS Server and connect to the database |
Revision as of 10:05, 20 May 2021
How to use Office 365 as login provider instead of Active Directory
You need to create an Enterprise application
Login into portal.azure.com
- Click New application
- Click Create your own application
- Enter a name
- Choose Integrate any other application you don't find in the gallery (Non-gallery)
- Click Create (This will also create an App registration)
- Find Properties for the Enterprise application you just created
- Set User assignment required? and Visible to users? to false
- Click Save
- Click Single sign-on
- Click SAML
- Click edit under Basic SAML Configuration
- Delete all info under Identifier (Entity ID)
- Enter the URL https://{URL}/{CustomerID} replace {CustomerID} with you number. This can be found in the configurator program under license info
- Enter this in Reply URL (Assertion Consumer Service URL) https://{URL}/{CustomerID}/SSO/AssertionConsumerServiceAzureAd.aspx
- Delete all info under Identifier (Entity ID)
- Open SQL Management Studio on the UMS Server and connect to the database
- Run this SQL Command
- Update UMSWebGeneralSettings Set SetSSO = 1
- Run this SQL Command
- Login to UMS web
- You will be redirected to SSO setup
- Click Add, enter a name and click Create
- Choose the name in the drop down and click Edit
- Click Add under the section Create new Single Sign On
- Choose Azure AD in the Type drop down
- In the boxes Name, SingleSignOnServiceUrl and SingleLogoutServiceUrl replace {appId} with the application id of your Enterprise application
- The LocalCertificateFile must be entered with a PFX certificate. This file must be placed in the root directory of your UMS Academic installation (Normally C:\inetpub\wwwroot)
- The LocalCertificatePassword must be entered to be able to read the PFX certificate
- The PartnerCertificateFile is a certificate the is generated during setup in portal. This file must be placed in the root directory of your UMS Academic installation (Normally C:\inetpub\wwwroot)
- You will be redirected to SSO setup
- Open UMS Configurator program
- Click Web Setup
- Select General settings
- Select Azure AD in the Check login against drop down list
- Open SQL Management Studio on the UMS Server and connect to the database
- Run this SQL Command
- Update UMSWebGeneralSettings Set SetSSO = 0
- Run this SQL Command
- Restart IIS
Reset password for others
- Go to Azure Active Directory
- Click Roles and administrators
- Find Password administrator
- Click Add assignments
- Find the name of the Enterprise application you created earlier
- Select it and click Add