SSO Admins can follow the steps in the guide to configure SAML single sign-on for the FranklinCovey Impact Platform with ADFS. Find more detailed information from Microsoft about setting up SAML single sign-on in their interface. Please note: You will likely need the proper administrative privileges to follow the configuration instructions.
Setting up SAML single sign-on requires you to configure settings on ADFS and the Admin Platform. Start by creating the FranklinCovey app in Azure. Then you can use your metadata to configure the Admin Platform SSO Management page settings using the instructions linked at the end of the article.
- Log in to your ADFS account and navigate to the Admin Center.
- Click on the "Applications" tab and select "Add Application."
- Select "Add a Non-Claims-Aware Application" and "SAML-based application."
- Enter a name for your new SSO app and click "Next."
- Under "SAML Signing Certificate," select "Create a self-signed certificate."
- Under "Configure URL," enter the "Relying on Party SAML URL" and "Relying on Party Logout URL" for your app.
- Under "Configure Identifiers," enter the "Relying Party Trust Identifier" for your app.
- Under "Configure Multi-factor Authentication," choose whether you want to require multi-factor authentication for your users.
- Click "Finish" to create your new SSO app.
- To grant users access to the app, navigate to the "Users and Groups" tab.
- Click "Add Group" or "Add User" and select the users or groups you want to grant access to.
- Choose the app you just created and set the appropriate permissions.
| NEXT STEP: Now that you have successfully created a new SAML 2.0 SSO app in ADFS, refer to the Enabling SAML Single Sign-on for FranklinCovey Site help article to input your metadata and enable SSO on the Impact Platform. |
Comments
0 comments
Article is closed for comments.