What is SSO?
Single sign-on, or SSO, is an authentication process that allows a user to log in with a single set of credentials to multiple, independent software systems.
Please note: ETO is not an SSO provider. This feature is meant to link ETO to your existing SSO configuration. If you do not currently have SSO set up and running in your organization, please contact your internal IT team. If you are currently using SSO elsewhere in your organization, and would like to include ETO, you will use this feature to do so.
To add Federated SSO to your ETO experience, please reach out to ETO Support via chat or email at firstname.lastname@example.org.
Federated SSO utilizes a SAML 2.0 protocol to allow Enterprise Managers to include ETO in their SSO configuration. This increases security and improves user experience by allowing users to authenticate into ETO using their existing Identity Provider.
How to configure Federated SSO in ETO
Federated SSO is available to Enterprise Managers via the Side Navigation.
Select Enterprise, then Manage Federated SSO.
This will load the Federated Identity Providers page with the SSO pool ID and SSO pool domain name.
Please use this information to generate the metadata XML file in your identity provider. Example: Azure, G Suite, etc.
The metadata file can either be uploaded by clicking on the “Select XML file” button or entering the URL in the metadata textbox.
Please verify or enter the email attribute for your provider. The email attribute exists in the metadata file or on the Identity Provider setup page.
This generates a login URL which can be copied using the Copy URL button. Share this URL with users who need to login through SSO.
Removing the Configuration
Deleting the SSO configuration will prevent users from logging into ETO using the SSO URL. Users will need to log into ETO with the correct ETO address depending on location:
US Private: https://secure.etosoftware.com
US Public: https://secure.etosoftware.us
To delete an existing SSO configuration:
In the Side Navigation, select Enterprise, then Manage Federated SSO.
Select the ellipsis (3 dots) on the Federated SSO page.
Select Delete Configuration.
On the prompt, click Continue to delete the configuration, or Cancel to return to the Manage Federated SSO page without making changes.
Updating the Configuration
When using Federated SSO, any new users to ETO will need to exist in the SSO provider as well. Their emails must match exactly. When adding new users, there is no need to update the configuration file. It will update automatically as new users are added to the SSO provider.
Troubleshooting Log In Issues
For users who are unable to log in, please pay close attention to the error message received.
If the error message originates from your organization's SSO provider, please work with your Enterprise Manager or IT team to correct the issue.
If the error message originates from ETO (this may appear as a generic error in the top left of an otherwise blank page), please contact ETO Support. It's possible you may still need to work with your Enterprise Manager to resolve these types of issues.
Setup ETO SSO with Azure
Create an Azure Enterprise Application
Open Office 365 Admin Center > Azure Active Directory
Go to Enterprise Applications
Choose + New application
Choose + Create your own application
Create the name of your application and choose Integrate any other application you don’t find in the gallery (Non-gallery) > Press Create
Configure Azure Enterprise Application
Navigate to your newly create Azure Enterprise Application under Enterprise Applications > All applications > YourAppName.
Under manager > Choose Single-sign on > Choose SAML
Under Identifier (Entity ID) choose Add identifier. Fill in the identifier with your ETO tenant’s SSO Pool ID from your ETO Managed Federated SSO page.
Please add the entity id with the following text as the prefix: urn:amazon:cognito:sp: <YourSSOPOOLID>
Under Reply URL (Assertion Consumer Service URL) choose Add reply URL. Fill in the reply URL with your SSO POOL DOMAIN NAME from your ETO Managed Federated SSO page.
Scroll down the page to the SAML Signing Certificate section.
Navigate to your Managed Federated SSO page and click Add SAML
Copy the App Federated Metadata Url and paste the information into the Provide a metadata document endpoint URL > Click SAVE
Adding SSO Users
Navigate to Users and groups inside the Enterprise Application.
Choose + Add user/group
Choose specific users or provisioned groups to allow users you want to have SSO Capabilities with ETO > Click Assign.
You will now be presented a LOGIN APP URL in which you can use directly or setup a page redirect with a shorter page/domain name to login to ETO via Azure SSO