The Active Directory integration will allow you to authenticate the users of your app against your own existing Active Directory user pool. CivicPlus's Active Directory integration uses SAML (Security Assertion Markup Language) 2.0.
Important Note
- This integration is separate from the Custom IdP integration with Active Directory and CivicPlus.
Instructions
- To use the Active Directory integration, you must have an Active Directory App configured. In the example below we are using the Enterprise application and choosing the Integrate any other application you don't find in the gallery (Non-gallery) option
- In CivicOptimize, navigate to Apps and click Manage on your app
- Navigate to the User tab
- Note: Users can be added manually on this screen. Instead of using the out-of-the-box user pool, you can instead choose to integrate with your existing SAML SSO (single sign-on) provider.
- Toggle on the Enable switch under Integrate with a SAML SSO Provider
- Follow the SAML Configuration & Instructions
- Active Directory Setup
- Create a Single Sign-On application in your Active Directory
- Copy the Identifier (Entity ID) into your application configuration
- Copy the Reply URL (Assertion Consumer Service URL) into your application configuration
- Copy the App Federation Metadata Url from your Single Sign-On application
- App Federation Metadata Url: Enter the URL you copied from your application
- Mapping Additional User Details: The listed claims can be added to your Single Sign-On application which will be included in the submission data
- Active Directory Setup
- Click Save
- Note: After clicking the Save button, users will be redirected straight to your Active Directory login screen when clicking the Login button in this app.
Comments
Let us know what was helpful or not helpful about the article.0 comments
Please sign in to leave a comment.