Configuring single sign-on (SSO) with Azure

For partners subscribed to Enterprise plans.

This article explains how to configure the SAML SSO integration of the new Azure AD portal and IT Glue. These instructions apply to the newer Azure portal interface. Learn how to configure SAML SSO for the Azure classic portal in this article.

Prerequisites

  • Microsoft Azure account with Azure AD Premium activated.
  • Administrator level access to IT Glue and a Global Admin or Co-admin account in Azure.
  • All of your users under your account in IT Glue will need an account in Azure Active Directory with exactly the same email address. We don’t create user accounts under SSO.
  • Before turning this feature on, log in to your IT Glue account twice - once in a regular browser and once in an incognito/private window. Alternatively, you can also log in to two separate browsers.

Instructions

  1. Log in to the Azure portal (https://portal.azure.com/). In the left-hand menu, click on Azure Active Directory.


    Home_-_Microsoft_Azure.png

  2. In the new Azure Active Directory left-hand menu, click Enterprise applications.


    Company_-_Overview_-_Microsoft_Azure.png

  3. Click + New application at the top of the screen.


    Enterprise_applications_-_All_applications_-_Microsoft_Azure.png

  4. In the Add an application section, click on the Non-gallery application button.


    Add_an_application_-_Microsoft_Azure.png

  5. Give the new application a name and then click the Add button at the bottom of the screen. This will add a custom application to your Azure Active Directory.
    Note: If you do not have Azure AD Premium activated, you will not be able to enter the name of the application and an invite message to upgrade to Premium will appear.


    Add_your_own_application_-_Microsoft_Azure.png

  6. Once the application loads, click Users and groups in the left-hand menu. Click + Add user to assign users or user groups to this application.


    IT_Glue_SSO_-_Users_and_groups_-_Microsoft_Azure.png

  7. Next, click Single sign-on in the left-hand menu and then on SAML.


    IT_Glue_SSO_-_Single_sign-on_-_Microsoft_Azure.png

Setting up single sign-on with SAML in Azure

Complete the below five sections to setup single sign-on with SAML:

Basic SAML Configuration

  1. In the setup screen, click on the pencil icon in the Basic SAML Configuration box.


    SAML-based_sign-on_-_Microsoft_Azure.png

  2. Enter the following URLs in the fields provided, replacing subdomain with your subdomain:
    • Identifier (Entity ID): Enter your IT Glue subdomain, e.g. https://subdomain.itglue.com
    • Reply URL (Assertion Consumer Service URL): Enter https://subdomain.itglue.com/saml/consume
    • Sign on URL: Enter https://subdomain.itglue.com
    • Relay State: Skip. It's an optional parameter that is used to tell the application where to redirect the user after authentication is completed.
    • Logout URL: Enter a URL where IT Glue can redirect users after they logout of IT Glue.
    Be sure to fill in your IT Glue subdomain where it says subdomain. Note that there's no trailing slash at the end of the URL. Click the Save icon when finished.


    Basic_SAML_Configuration_-_Microsoft_Azure.png

User Attributes & Claims

  1. Return to the setup screen and click on the pencil icon in the User Attributes & Claims box.


    SAML-based_sign-on_-_Microsoft_Azure-2.png

  2. Click on the pencil icon next to Name identifier value. A Manage user claims sidebar will appear.


    User_Attributes___Claims_-_Microsoft_Azure.png

  3. Enter a name and select user.mail in the Source attribute drop-down menu. Click Save.


    Manage_user_claims_-_Microsoft_Azure.png

SAML Signing Certificate

  1. Return to the setup screen and click on the pencil icon in the SAML Signing Certificate box.


    SAML-based_sign-on_-_Microsoft_Azure-3.png

  2. Enter a notification email for the certificate expiry reminders. Click Save.


    SAML_Signing_Certificate_-_Microsoft_Azure.png

  3. Back in the setup screen, click to download the Certificate (Base64) to save the certificate file on your computer.

Setup <Your Application Name>

  1. Return to the setup screen and click the View step-by-step instructions link in the Setup <Your Application Name> box.


    SAML-based_sign-on_-_Microsoft_Azure-4.png

  2. Review the documentation that will guide you through filling out the Login URL, Azure AD Identifier, and Logout URL fields.

Validate Single Sign-on with <Your Application Name>

  1. Return to the setup screen and click the Validate button in the Validate Single Sign-on with <Your Application Name> box to check if single sign-on is working.


    SAML-based_sign-on_-_Microsoft_Azure-5.png

Leave the Azure portal open as you continue onto configuring IT Glue. You will need to refer to it frequently in the next section of this KB.

Configuring IT Glue

After setting up Azure, you need to configure your IT Glue account to authenticate using SAML. You will need a few pieces of information from Azure to complete this step.

Important. It's highly recommended that before you begin the below set of instructions, log in to your IT Glue account twice - once in a regular browser and once in an incognito/private window. Alternatively, you can also log in to two separate browsers. This is to ensure that you are still logged in to your account in case you are locked out in the other window.
  1. Log in to IT Glue and click Account from the top navigation bar.
  2. Click Settings from the sidebar.


    Account_Settings___IT_Glue_copy.png

  3. Click on the Authentication tab and then turn the Enable SAML SSO toggle switch to ON. Once this turned on, a form will appear. You will need to collect information from Azure and enter it into this form.


    Untitled-2_copy.png

    • Copy the Azure AD Identifier and paste it in the IT Glue Issuer URL field.
    • Copy the SAML Single Sign-On Service URL and paste it in the IT Glue SAML Login Endpoint URL field.
    • Copy the Sign-Out URL and paste it in the IT Glue SAML Logout Endpoint URL field.
    • Go back to the previous page of the Azure settings and copy the Thumbprint and paste it in the IT Glue Fingerprint field.
    • Open your Base64 encoded certificate downloaded from Azure portal in notepad, copy the content of it in to your clipboard, and then paste it in the IT Glue Certificate field.
      Important.Ensure there are no extra spaces trailing at the end of the Certificate string (i.e. after -----END CERTIFICATE-----).
  4. Click Save to complete the set up of your account.
    Warning. Click Save only when all information has been entered. If you turn on SSO prematurely, it will break the login experience for all users on your account.

Once you make this change, you can test your access.

Testing SSO authentication

In the above section, you should have created two IT Glue browser sessions. If you are locked out, you will be able to use the incognito/private window to turn off SSO while you investigate the cause.

To make sure SSO is working, perform these steps:

  1. Log out of and close the Azure management portal and the Azure AD access panel.
  2. In a new browser session, navigate directly to the access panel at http://myapps.microsoft.com.
  3. Enter your Azure AD credentials to log in. After authentication, you will be able to interact with the applications integrated with the directory.
  4. Click on the IT Glue SSO application you created to be redirected and logged in to IT Glue.


    Azure-Access-Panel-Apps.png

Another way to test SSO access is to go to your account subdomain (mycompany.itglue.com) directly.

Common Questions

When the SSO server is unavailable, how do we access our accounts?

If your SSO provider's service is unavailable, you can still login using your IT Glue username and password at app.itglue.com.

If your SSO is not working, confirm your provider's service is available. Send us an email for assistance.

How do we disable SSO for a user?

To disable a user account, an Administrator or a Manager will need to navigate to the Account > Users page in IT Glue. We don’t currently support disabling user accounts through the SSO server.

Was this article helpful?
3 out of 3 found this helpful
Have more questions? Contact us