1-866-477-6267 (toll-free)
Support Home > Integrations > Azure Active Directory SSO > Tutorials > Configure IdP-Initiated SSO for Microsoft Azure AD

Configure IdP-Initiated SSO for Microsoft Azure AD

Objective

To configure Procore's IdP-Initiated SSO solution for Microsoft Azure Active Directory (Azure AD).

Background

If your company manages your users with Microsoft Azure Active Directory, you can leverage its Single Sign-On (SSO) capabilities. This give your end users the ability authenticate their identify for the Procore application using their Microsoft Azure Active Directory account. With this SSO integration, you can:

  • Leverage SSO with a Microsoft Azure subscription.
  • Simplify your entire organization's password management process.
  • Avoid problematic user password management with this easy to use integration.

Things to Consider

  • Authentication Protocol:
    • You can integrate the Procore application with Azure Active Directory using the Security Assertion Markup Language (SAML 2.0). 
  • Supported Edition:
  • Required Permissions:
    • Global Administrator rights to Azure Active Directory.
    • 'Admin' level permissions to Procore's Company level Admin tool.

Steps

Azure Active Directory Steps

Add Procore to Azure Active Directory

  1. Log into into your Azure management portal.
    Note: You must login with an account that has Global Administrator rights to Azure Active Directory. 
  2. Navigate to the Active Directory > [YourCompany] > Applications section. 
  3. Click Add.
  4. Click Add an Application from the Gallery.
  5. In the left pane, click Custom or click the Add an Unlisted Application My Organization is Using link.
  6. In the Name box, enter a name for the Procore application.
    In this example, we typed: Procore SSO


     
  7. Click the checkmark in the bottom right corner. 
  8. Continue with Enable Single Sign-On in Azure Active Directory.

Enable Single Sign-On in Azure Active Directory

  1. Complete the steps in Add Procore to Azure Active Directory.
  2. Next to '1 | Enable Single Sign-On with Windows Azure AD', click the Configure Single Sign-On button.


     
  3. At the 'How would you like users to sign on to Procore SSO' page, choose the Windows Azure AD Single Sign-On option. Then click the right arrow at the bottom right of the page. 


     
  4. At the Configure App Settings page, enter this information for the Procore application:
  5. Click the right arrow at the bottom of the page.
  6. At the 'Configure Single sign-on at Procore SSO' page, save the following information for later user:
    Note: Keep this certificate in a safe place. You will need it when you complete the steps in Add the Azure Active Directory SSO Certificate to Procore below.
    • Click the Download Certificate link and save the certificate to your computer.
    • Copy the Issuer URL for later use.


       
  7. Configure the Procore application for Azure Active Directory SSO. For instructions, see Add the Azure Active Directory SSO Certificate and Issuer URL to Procore. After saving the changes in Procore, continue with the next step.
  8. Mark the Confirm that you have configured single-sign on… checkbox.
  9. Click the right arrow at the bottom of the page to continue.
    The system confirms that you have enabled SSO. 
  10. Click Next and then click Complete.
  11. Continue with the next step, Assign Accounts in Azure Active Directory.

Assign Users and Groups to Procore

  1. In the Procore application's page, click the Assign Users button.


     
  2. Select the users to whom you will grant access to Procore. Then click Assign at the bottom right of the page. 
    Note: If you want to test the Azure Active Directory SSO integration before deploying it to your end users, add only your user account. Then, after completing the configuration steps and testing the integration, come back and assign the rest of your company's users to Procore. 



    The system displays a message to confirm that you want to grant access to these users. 
  3. Click Yes to confirm that you want to grant the selected users access.
    Yes will appear for each user in the 'Access' column.

Procore Steps

Add the Azure Active Directory SSO Certificate and Issuer URL to Procore

  1. Log into the Procore application.
    Important: You must log into Procore with an account that has been granted 'Admin' level permissions to the Company level Admin tool.
  2. Navigate to the Company level Admin tool. 
  3. Under 'Company Settings', do the following:
    • Single Sign On Issuer URL. Paste the 'Remove Login URL' that you obtained from Azure Active Directory in this field. See Configure SSO in Azure Active Directory
    • Single Sign On x509 Certificate field. Paste the information from the certificate that you downloaded from Azure Active Directory. See Configure SSO in Azure Active Directory
      Important! When copying the certificate information from , do NOT copy the "------------BEGIN CERTIFICATE------------" and "------------END CERTIFICATE------------" markers. You only want to copy the text that resides between these markers. 
    • Single Sign On x509 Certificate. Always leave this field blank to avoid redirecting users to an unsupported login page. A target URL is NOT supported by the Azure Active Directory SSO solution. 

  4. Scroll to the bottom of the page, and click Save Changes.

You should now log into Azure Active Directory or have an end user log in to verify the configuration settings were entered correctly.

You must to post a comment.
Last modified
14:11, 31 Mar 2017

Tags

Classifications

This page has no classifications.