Microsoft Azure Active Directory SSO Integration
StatusCast allows you to utilize Azure’s AD so that you’re administrators and users don’t need to manage multiple passwords. Please note that at this time StatusCast’s SSO integraton is considered an IDP initiated SSO, so you will still have to manage access restrictions to the administrative portal through StatusCast.
To setup SSO with StatusCast you will need to first add a new Enterprise Application to your Azure environment under the Azure Active Directory section. The name of the Enterprise Application is not significant to StatusCast. Under the Single sign-on section within your new application, set the SSO mode to SAML-based Sign-on and under the Identifier(Entity ID) and Reply URL fields set both to https://[YOURDOMAIN].status.page/sso/saml. Set the User Identifier to user.mail.
There should not be any further configuration required for your enterprise application, however please note that you will need to provide your users in Azure access to this integration through the Users and groups section of your application.
In a new tab or window log into your StatusCast admin portal. Navigate to the Integrations section by clicking Settings > Integrations. Under the SSO card select the Install option. (https://[yourapp].status.page/admin/integrations/sso)
To complete the integration select the role you want to assign users first. You can assign user roles to allow permissions to view or access specific component data. You should go through this process for each role you will be using Azure for authentication in Statuscast
- Use the dropdown menu to choose Azure as the SSO provider
- Enter your App ID for Statuscast found in Azure AD
- Enter the SSO Target URL unique the Azure App which you can find in the setup instructions labeled as your Identity Provider Single Sign-On URL.
- Optionally, you can add a Group Attribute (see Groups Attribute for details)
- Paste a copy of your X.509 Certificate into appropriate field in StatusCast.
- Select Install to save your configuration.
Now your Azure Active Directory integration is complete and the users you granted access to can sign into StatusCast using their SSO credentials.
The URL paths for each of the roles are listed below:
Subscriber > https://[yourapp].status.page/login
Employee > https://[yourapp].status.page/login/employee
Manager > https://[yourapp].status.page/login/manager
Administrator > https://[yourapp].status.page/login/admin
Company Administrator > https://[yourapp].status.page/login/companyadmin
Updated about 1 month ago