Guide
...
Setup
Tech setup
Set up SSO (Azure)
2min
Who can do this:
- Anyone with editing permissions for Structure and Login/Signup SSO
Below are the steps for your IT administrator to configure Azure AD/Entra ID, to facilitate:
- Single-Sign On via SAML 2, so users can log into the app with their company email
- User synchronization, via Microsoft Graph API, so Refresh accounts are automatically disabled when employees are terminated
Before you begin:
Start a notes file or another document to paste information to share with us. If you have any questions, don't hesitate to contact the Refresh team.
1
Register your app
- Go to https://portal.azure.com/.
- Click Microsoft Entra ID.
- In the left column, click App registrations.
- At the top, select New registration.
- In the Name field, enter Refresh.
- Select the following:
- Accounts in any organizational directory (Any Microsoft Entra ID tenant - Multitenant) and personal Microsoft accounts (e.g., Skype, Xbox)
- Click Register.
2
Obtain key info
- Under Essentials, copy the following IDs into your notes:
- Application (client) ID
- Directory (tenant) ID
- At the top, select Endpoints.
- Copy the following into your notes:
- SAML-P sign-on endpoint
- SAML-P sign-out endpoint
- Close the Endpoints panel.
3
Configure web platform
- In the left column, select Authentication.
- Under Platform configurations, click Add a platform.
- Select Web.
- In Redirect URIs, enter:
- https://[OrganizationName].app.refreshplatform.com/saml
- For Front-channel logout, enter:
- https://[OrganizationName].app.refreshplatform.com/logout
- Click Configure. You’ll now have a web configuration under Platform configurations.
- Use Add URI in the Web box to add two more Redirect URIs. These allow for sandbox testing:
- https://[OrganizationName].app-staging.refreshplatform.com/saml
4
Enable access tokens
- Under Implicit grant and hybrid flows, select Access tokens (used for implicit flows).
- At the bottom, click Save.
5
Upload certificate
You should have received the certificate from us via email, which you can save to your computer.
- In the left column, select Certificates & secrets.
- Select the Certificates tab, if not already selected.
- Click Upload certificate.
- Select the certificate from your files.
- Click Add.
6
Create new client secret
- Click New client secret.
- In the Description field, enter Refresh Platform.
- In the Expires dropdown, select 730 Days (24 months).
- Copy the following into your notes:
- Client secret value (from the newly created secret)
7
Configure token info
- In the left column, click Token configuration.
- Click Add optional claim.
- For Token type, choose ID.
- Select the following claims:
- Acct
- Email
- Family_name
- Given_name
- Preferred_username
- Click Add.
8
Add groups claim
- Click Add groups claim.
- Select the following:
- Security groups
- Directory roles
- All groups (includes distribution lists but not groups assigned to the application)
- Groups assigned to the application
- Click Add.
9
Add permissions
- In the left column, select API permissions.
- Click Add permission.
- Select Microsoft graph, and then Application permissions.
- Select these permissions in the following categories:
- a. User
- i. User.Read.All
- Click Add permissions.
10
Share notes
Once you've completed the steps above, please email your notes file to [email protected].
Updated 29 Oct 2024
Did this page help you?