Follow these steps (see also screenshot below) if you're using Azure AD. You probably need an Azure administrator to perform this, an HR contact might not have enough permissions to do this. Next, our development team will approve your request so that you can log in using your own Azure AD.
If you use an OpenID Connect protocol, please send the requirements listed below to helpdesk@effectory.com and then proceed to configure a client for Effectory in your identity provider. When setting up the configuration in your identity provider, take into account the following:
• A claim with the name “email” is required for authentication. The claims “given_name” and “family_name” are not required, but it would be preferable if they were also included in the token.
• Two scopes will be used to get the required information: ‘openid’ and ‘profile’.
• The callback URL used will be https://signin.effectory.com/openid/[identifier]/callback, where [identifier] is the identifier described below.
We recommend to arrange a test account so that Effectory’s development team can test the SSO implementation before enabling it for everyone.
1. An identifier for your identity provider, to be used by Effectory. A unique identifier is required to discern between different identity providers. This identifier will then be used in the login URL (https://signin.effectory.com/identifier) and in the callback URL. Provide your unique identifier using only alphanumeric characters, and no special characters or diacritics.
2. The list of domain names that are used in your provider. Please provide a comma-separated list of domains, e.g.: @example.com,@domain.com,@company.com. It is currently not possible to use private e-mail address like Gmail.
3. The e-mail address of the technical contact, that can be contacted in case of questions or issues.
4. Share the OpenID well-known endpoint. This is your authority URL followed by ‘/.well-known/openid-configuration’, e.g. https://login.domain.com/.well-known/openid-configuration.
5. Share your ClientId, a unique ID in your identity provider that allows Effectory to communicate with it and authenticate.
1. Your organization's name as known by SURFconext. Alternatively, you can look up your organization in the SURFconext metadata and provide us with the EntityID.
2. The list of domain names that are used in your provider.
Please provide a comma-separated list of domains, e.g.: @example.com,@domain.com,@company.com. It is currently not possible to use private e-mail address like Gmail.
3. The e-mail address of the technical contact, that can be contacted in case of questions or issues.
Once we have received the necessary information, we will arrange together with SURFconext that your organization can log in to Effectory's software.
Comments
Please sign in to leave a comment.