Single Sign-On (SSO) Authentication with AD FS

Introduction

In this article, you'll learn how to set up Single Sign-On (SSO) authentication with AD FS. To learn more about enabling SSO authentication in OfficeRnD Flex, you can take a look at the Single Sign-On (SSO) Authentication article

Keep in mind that when you activate an SSO authentication, the following OfficeRnD Flex authentication services are disabled:
  • The standard login with an OfficeRnD Flex user and password.
  • The "Reset password" links in OfficeRnD Flex.
  • The token for authentication that employees receive when invited to the Members Portal

Set up Members Portal SSO

  1. Login to your OfficeRnD Flex account.
  2. Navigate to Settings/Integrations/Authentication.
  3. Activate Members SSO Authentication.
  4. Click Configure. This will open a pop-up window with fields we will use during the setup.
  5. Open the AD FS Management application on your AD server and navigate to Application Groups.

  6. On the Actions pane, click Add Application Group…
  7. Type in Name, and choose Server application as Template. Click Next.
  8. Switch to OfficeRnD and copy the Return URL from the configuration pop-up. Paste it into the Redirect URI field on the Server Application. Click Add. Check Admin SSO to activate that option as well.

  9. Copy the Client ID from Client Identifier in AD FS and paste it in OfficeRnD.
  10. Click Next on AD FS and select Generate a shared secret. Copy the secret and paste it into OfficeRnD's Client Secret field.
  11. Click Next in the AD FS to review the summary, Next again, and Close to complete the wizard

  12. Enter the Discovery URL in OfficeRnD. Use the below template and substitute <ADFS_ROOT> with your AD FS domain (e.g https://my.domain.org/adfs/.well-known/openid-configuration)
     <ADFS-ROOT>/.well-known/openid-configuration
  13. Set the Email Claim field to upn.
  14. Click Update to finish the set-up.
Enable Automatic Account Activation setting in OfficeRnD's configuration - With this setting enabled, members that already exist in OfficeRnD Flex will be allowed to log into the portal without needing to be explicitly invited. If this setting is disabled - members without prior access to the portal will need to have it Enabled by an administrator.

Set up Admin Portal SSO

  1. Login to your OfficeRnD Flex account.
  2. Navigate to Settings/Integrations/Authentication.
  3. Activate Admin SSO Authentication.
  4. Click Configure. This will open a pop-up window with fields we will use during the setup.
  5. Open the AD FS Management application on your AD server and navigate to Application Groups.

  6. On the Actions pane, click Add Application Group…
  7. Type in Name, and choose Server application as Template. Click Next.
  8. Switch to OfficeRnD and copy the Return URL from the configuration pop-up. Paste it into the Redirect URI field on the Server Application. Click Add.

  9. Copy the Client ID from Client Identifier in AD FS and paste it in OfficeRnD.
  10. Click Next on AD FS and select Generate a shared secret. Copy the secret and paste it into OfficeRnD's Client Secret field.
  11. Click Next in the AD FS to review the summary, Next again, and Close to complete the wizard

  12. Enter the Discovery URL in OfficeRnD. Use the below template and substitute <ADFS_ROOT> with your AD FS domain (e.g https://my.domain.org/adfs/.well-known/openid-configuration)
                    <ADFS-ROOT>/.well-known/openid-configuration
  13. Set the Email Claim field to upn.
  14. Click Update to finish the set-up.

Below, you can find the steps to add Admin SSO along with an already set up Members SSO.

  1. Navigate to Settings/Integrations/Authentication.
  2. Activate Admin SSO Authentication.
  3. Copy the Return URL from the Admin Portal section and Add it to the one from the above step 8.mceclip0.png
  4. Finish the setup.
Enforce SSO for All Admins - this option eliminates the OfficeRnD login (email and password) in favor of an entirely AD FS login. Otherwise, admins will have both options to choose from.
Was this article helpful?
0 out of 0 found this helpful

Comments

0 comments

Please sign in to leave a comment.