Looking for FAQs? Jump there by clicking this link.
What is SSO?
Single sign-on, or SSO, is an authentication process that allows a user to log in with a single set of credentials to multiple, independent software systems.
Please note: ETO is not an SSO provider. This feature is meant to link ETO to your existing SSO configuration. If you do not currently have SSO set up and running in your organization, please contact your internal IT team. If you are currently using SSO elsewhere in your organization, and would like to include ETO, you will use this feature to do so.
To add Federated SSO to your ETO experience, please reach out to ETO Support via chat or email at email@example.com.
Federated SSO utilizes a SAML 2.0 protocol to allow Enterprise Managers to include ETO in their SSO configuration. This increases security and improves user experience by allowing users to authenticate into ETO using their existing Identity Provider.
Note: SSO is not supported for ETO Multi factor authentication (MFA) for organizations that enable SSO
How to configure Federated SSO in ETO
Federated SSO is available to Enterprise Managers via the Side Navigation.
Select Enterprise, then Manage Federated SSO.
This will load the Federated Identity Providers page with the SSO pool ID and SSO pool domain name.
Please use this information to generate the metadata XML file in your identity provider. Example: Azure, G Suite, etc.
The metadata file can either be uploaded by clicking on the “Select XML file” button or entering the URL in the metadata textbox.
Please verify or enter the email attribute for your provider. The email attribute exists in the metadata file or on the Identity Provider setup page.
This generates a login URL which can be copied using the Copy URL button. Share this URL with users who need to login through SSO.
Removing the Configuration
Deleting the SSO configuration will prevent users from logging into ETO using the SSO URL. Users will need to log into ETO with the correct ETO address depending on location:
US Private: https://secure.etosoftware.com
US Public: https://secure.etosoftware.us
To delete an existing SSO configuration:
In the Side Navigation, select Enterprise, then Manage Federated SSO.
Select the ellipsis (3 dots) on the Federated SSO page.
Select Delete Configuration.
On the prompt, click Continue to delete the configuration, or Cancel to return to the Manage Federated SSO page without making changes.
Updating the Configuration
When using Federated SSO, any new users to ETO will need to exist in the SSO provider as well. Their emails must match exactly. When adding new users, there is no need to update the configuration file. It will update automatically as new users are added to the SSO provider.
Troubleshooting Login Issues
For users who are unable to log in, please pay close attention to the error message received.
If the error message originates from your organization's SSO provider, please work with your Enterprise Manager or IT team to correct the issue.
If the error message originates from ETO (this may appear as a generic error in the top left of an otherwise blank page), please contact ETO Support. It's possible you may still need to work with your Enterprise Manager to resolve these types of issues.
If an account is locked inside of ETO, the end-user will see this message. The admin can unlock the account through Manage Site Navigation.
All ETO permissions including program access, reporting role, caseload access, etc. is controlled in ETO through Manage User Accounts.
Password Expiration Dates
Standard Login - Maximum Password age in days would still apply to the end-user
SSO Login - Maximum Password age does not apply, this would be controlled by your Identity Provider (IDP)
Setup ETO SSO with Azure
Create an Azure Enterprise Application
Open Office 365 Admin Center > Azure Active Directory
Go to Enterprise Applications
Choose + New application
Choose + Create your own application
Create the name of your application and choose Integrate any other application you don’t find in the gallery (Non-gallery) > Press Create
Configure Azure Enterprise Application
Navigate to your newly create Azure Enterprise Application under Enterprise Applications > All applications > YourAppName.
Under manager > Choose Single-sign on > Choose SAML
Under Identifier (Entity ID) choose Add identifier. Fill in the identifier with your ETO tenant’s SSO Pool ID from your ETO Managed Federated SSO page.
Please add the entity id with the following text as the prefix: urn:amazon:cognito:sp: <YourSSOPOOLID>
Under Reply URL (Assertion Consumer Service URL) choose Add reply URL. Fill in the reply URL with your SSO POOL DOMAIN NAME from your ETO Managed Federated SSO page.
Scroll down the page to the SAML Signing Certificate section.
Navigate to your Managed Federated SSO page and click Add SAML
Copy the App Federated Metadata Url and paste the information into the Provide a metadata document endpoint URL > Click SAVE
Adding SSO Users
Navigate to Users and groups inside the Enterprise Application.
Choose + Add user/group
Choose specific users or provisioned groups to allow users you want to have SSO Capabilities with ETO > Click Assign.
You will now be presented a LOGIN APP URL in which you can use directly or setup a page redirect with a shorter page/domain name to login to ETO via Azure SSO
Do standard login users get locked out once SSO is setup?
At this time, we do not lock users out of standard login. They will be able to login through standard as well as single sign on.
Can we have a custom login URL?
At this time, we do not have the option to create a custom login URL.
Can I configure a custom logout URL?
We do not support this feature at this time.
Will adding a user to my identity provider also add the user to ETO?
No, you will have to also go into ETO and add the user and user permissions.
How would it work if I have 2 environments to login into?
Each Environment needs to have their own configuration and login url. User will not be able to login to both environments using a single url.
What happens if I stay idle for a long time?
The system will log you out after the set number of minutes set by your organization and you will lose your work. Please ensure you save your work.