Single Sign-On via Azure AD

PDF
Products
All Creatio products

This article is relevant to Creatio version 8.0.3 and later. If you need to set up integration with Creatio version 8.0.2 and earlier for testing purposes or to look for errors, follow the instructions for Creatio version 7.18.

You can integrate Creatio with Azure Active Directory (Azure AD) to manage single sign-on for all Creatio users that work in the corporate network.

Attention. The example uses the https://site01.creatio.com/Demo_161215/ Creatio URL. Replace these URLs with the corresponding URLs of your sites when you perform the actual setup.

In general, the following steps are required to set up Single Sign -On in Creatio:

  1. Download the file that contains the integration metadata. Read more >>>
  2. Perform the setup in Azure AD. Read more >>>
  3. Perform the setup in Creatio. Read more >>>

Download the metadata  

  1. Click the button to open the System Designer.
  2. Click Single Sign On configuration.
  3. Click New provider. This opens a drop-down menu.
  4. Select “Azure AD.” This opens the setup page.
  5. Click Get metadata.
  6. Save the file to your local machine.

Perform the setup in Azure AD 

To configure the settings below, register Creatio in the administrator account of the enterprise identity service of Azure Active Directory (Azure AD). Learn more in the Microsoft documentation.

  1. Add a new SSO application (Trusted Relaying Party) to Azure AD:
    1. Open the Enterprise applications section → All Applications.
    2. Click New application.
    3. Select “Creatio” in the Add from the gallery section and add the application. Learn more in the Microsoft documentation: Add Creatio from the gallery.
  2. Open the Single sign-on section and specify the following parameters:
    1. Select “SAML” in the Single Sign-on Mode parameter.
    2. Enter the full website name, for example, “https://site01.creatio.com/Demo_161215/,” in the Identifier parameter.
    3. Enter the full website name and “svc/SsoLogin” address, for example, “https://site01.creatio.com/Demo_161215/ ServiceModel/AuthServiceModel/AuthService.service.svc/SsoLogin,” in the Reply URL parameter.
  3. Save the following data to perform the setup in Creatio (Fig. 1):
    • Azure AD Identifier
    • Login URL
    • Logout URL
Fig. 1 Data required to perform the setup in Creatio
creatio_azure_settings.png

Note. By default, Azure AD passes the following fields to Creatio: Given name, Surname, Email address, Name. The email address serves as the username.

Perform the setup in Creatio 

Follow these steps to set up single sign-on in Creatio:

  1. Click the button to open the System Designer.
  2. Click Single Sign On configuration.
  3. Click New provider. This opens a drop-down menu.
  4. Select “Azure AD.” This opens the setup page.
  5. Fill out the following parameters:
    1. Enter the unique identifier you got while setting up Azure AD in the Azure AD identifier parameter.
    2. Enter the URL of the identity provider’s single sign-on in the SingleSignOnServiceUrl parameter. For Azure AD, this is usually https://login.microsoftonline.com//saml2. Find out the settings of the added connector in the Azure account.
    3. Enter the URL of the identity provider’s single sign-off in the SingleLogoutServiceUrl parameter. For Azure AD, this is usually https://logout.microsoftonline.com//saml2. Find out the settings of the added connector in the Azure account.
  6. Fill out the provider's name to display on the Creatio login page in the Display name field.
  7. Turn on Just-In-Time Provisioning (optional). This mechanism automatically creates the corresponding Creatio user account with proper data from the identity provider, such as user group, employee name, contact information, etc. To do this, select the Create and update users data when log in (Just-In-Time Provisioning) checkbox and map the fields.
    Fig. 2 Set up Just-In-Time Provisioning
    scr_set_up_JIT_azure.png
  8. Select your provider in the SSO identity provider field and save the changes.
  9. Click Test to test whether the provider is working correctly (optional).

    Fig. 3 Test the provider
    scr_test_sso_provider_azure.png