Skip to main content

 

Eptura Knowledge Center

Implement SSO and User Provisioning through Azure Active Directory

This article details how to configure Proxyclick as a Non-Gallery application, for customers who prefer to set up from scratch or whose Azure AD plans do not include access to Gallery Apps.

If you prefer to use the Gallery App, then see the following articles from Microsoft Support:

Set up Azure AD in a single location


Step 1 - Add an application

  1. Log into the Azure Portal. Go to Azure Active Directory > Enterprise Applications.
  2. Click on New application.

Image1.png

  1. Click the Non-gallery application. (You might need to check if this possibility is included in your Azure subscription).

Image2.png

  1. Enter a name.
  2. Click Add.

Step 2 - Configure single sign-on (SSO)

  1. Open the Proxyclick app in Azure Active Directory > Enterprise Applications and go to the Single sign-on section.

Image3.png

  1. Select SAML-based Sign-on for Single Sign-on Mode.
  2. Go to the Proxyclick Marketplace and install Azure AD.
  3. Copy the Identifier and the Reply URL from the Azure AD configuration page and paste them into the corresponding fields in Azure AD.

Image4.png

  1. Select user.mail for User Identifier.
  2. Click on Save.

Image5.png

  1. Download the file Certificate (Base64) and open the Metadata XML to extract the EntityID and SingleSignOnService Location.
  2. Go back to the Azure AD configuration page (https://app.proxyclick.com/default/settings/integrations/sso/azuread) and paste them into the corresponding fields from Azure AD. Everything in the certificate file (including the BEGIN and END header and footer) needs to be copied into the Certificate (Base64) field in Proxyclick.

Image6.png

  1. Click on Save Changes.

Your Azure AD connection is ready. You can now use the URL in the Identifier field to log into Proxyclick using Azure AD SSO or log into Azure AD as a user and choose the Proxyclick app. But you will still need to add users in Proxyclick before you try to log in with SSO (you can do it manually, in bulk, or via User Provisioning. See next steps to configure User Provisioning with Azure AD).

Step 3 - Configure user provisioning

  1. Open the Proxyclick app in Azure Active Directory > Enterprise Applications and go to the Provisioning section.

Image7.png

  1. Select Automatic for Provisioning Mode.
  2. If not done already, go to the Proxyclick Marketplace and install Azure AD (https://integrations.proxyclick.com/integrations?id=54&alias=azure-ad).
  3. Copy the Tenant URL and the Secret Token from the Azure AD configuration page (https://app.proxyclick.com/default/settings/integrations/up/azuread) and paste them into the corresponding fields in Azure AD.

Image8.png

  1. Click on Save.
  2. After the settings are saved, go to the Mappings section.

Image9.png

  1. Click on Synchronize Azure Active Directory Groups to customappsso.

Image10.png

  1. Disable group synchronization by selecting No and then click on Save.
  2. Close the window to return to the provisioning configuration page.
  3. Click on Synchronize Azure Active Directory Users to customappsso.
  4. Adapt the attribute mappings:

Image11.png

Azure Active Directory Attributes

Azure Active Directory Attribute

customappsso Attribute

Matching Precedence

Mapping Type

mail

userName

1

Direct

Switch([IsSoftDeleted], , "False", "True", "True", "False")

active

 

Expression

givenName

name.givenName

 

Direct

surname

name.familyName

 

Direct

mail

emails[type eq "work"].value

 

Direct

  1. Click on Save.
  2. Close the window to return to the provisioning configuration page and go to the Settings section.

Image12.png

  1. Set Provisioning status to On and click Save.

Optional Supported Attributes

The below attributes can additionally be configured to pass more user data to Proxyclick.

  • Telephone and Mobile numbers must be in E.164 format
  • City can be substituted for any other string-based attribute to use in conjunction with the below settings for multi-location provisioning

Azure Active Directory Attribute

customappsso Attribute

Matching Precedence

Mapping Type

telephoneNumber

phoneNumbers[type eq "work"].value

 

Direct

mobile

phoneNumbers[type eq "mobile"].value

 

Direct

city

addresses[type eq "work"].locality

 

Direct

title

title

 

Direct

preferredLanguage

preferredLanguage

 

Direct

Set up for multiple locations

User Provisioning

You can configure Azure AD and manage users across multiple locations from a single Proxyclick account.

  1. Connect Azure AD in your main location (follow the steps above)

  2. Click on Multi-location mapping on the Azure AD integration in your Integration List

Image13.png

Important to note: If you do not see the Multi-location mapping button, you are running on an older version of our Azure AD integration. All you have to do is disconnect the integration and then reconnect it before continuing with the remaining steps.

You will then see the list of all the locations for which you are an Admin. You can enable/disable User Provisioning for each location from this list using the toggle button.

Image14.png

When enabled, you can import all users for provisioning in that location or define your filters for specific users.

Image15.png

You can filter users based on their city and language using the appropriate conditions.

Image16.png

Advanced

If you provision the same users in multiple locations, you can use the Advanced menu to force their “home location.” Proxyclick would then use this as the default location for new visits created (e.g. when using the Generic Calendar Integration).

Image17.png

Azure User Provisioning and Single Sign-on require both add-ons.