Follow the steps below to set up SSO with Azure AD:
Step 1: Navigate to Settings > Integrations.
Step 2: In the "Integrations" window, click select SAML Single Sign On.
Step 3: In the "SAML SSO" window, click ADD NEW.
Step 4: In the "ADD SAML SSO" window, click ENABLED and type the Identifier Name.
Step 5: Once saved, the system will generate the ACS URL and Entity ID.
Note: Use the ACS URL and Entity ID URLs (in step 14) to configure basic SAML.
Step 6: Log in to your Azure Portal and navigate to Azure Active Directory from the side menu. It will redirect you to the "Overview" window.Step 7: Click Enterprise applications from the side menu.
Step 8: In the "Enterprise Applications", click + New application to add your own application.
Step 9: In the "Browse Azure AD Gallery" window, click Create your own application.Step 10: Provide a name in the name field. Select "Non-gallery" and click Create.
Step 11: In the Overview window, click the Set up single sign-on.
Note: You can also select the Single sign-on option from the side menu.
Step 12: Select SAML.
Step 13: In the "Basic SAML Configuration", provide the "Entity ID" and the "Assertion Consumer Service URL"(ASC URL) that was generated in Engagedly in Step 5.
Step 14: Add the Entity ID and ACS URL and click Save to save the configuration.
Step 15: Scroll down to the "SAML Certificates" section and download the certificate.
Step 16: Open the certificate file in a text editor and copy the whole content along with the-- BEGIN CERTIFICATE--and-- END CERTIFICATE-- lines and paste it into the certificate field in Engagedly.
Step 17: Go back to the "Set up Engagedly" section in Azure and copy the "Login URL" to the "Identity Provider Single Sign-On URL" field and the "Azure AD Identifier" to the "Identity Provider Issuer" field in Engagedly. And click SAVE.
Step 18: Go to the "Attributes & Claims" section and click Edit.
Step 19: Click the Source attribute and select "user.mail."
Step 20: Click Save.
Step 21: The source attribute was now changed.
Step 22: You have successfully integrated Azure Active Directory with Engagedly for SSO. At last, do not forget to assign users from the Users and Groups page. To do so, go back to the "Overview" page in Azure and click Assign users and groups, or you can also select the option from the side menu.
Step 23: To test SSO, go back to Engagedly and click Edit on the recently saved configuration.
Step 24: Click Test Connection to test SSO.
Step 25: Enable the "IS Open ID" if your test connection is successful and click SAVE.
Your SSO setup is now complete. Please log out of Engagedly and try it out.
Note: If you are locked out of Engagedly, please immediately reach out to email@example.com immediately.