Sounding Board supports enterprise single sign-on access to Sounding Board accounts via Secure Assertion Markup Language (SAML). With SSO, users can sign in once using their company sign-in form.
This article contains the following topics:
- How SAML SSO works for Sounding Board
- Enabling SSO
The IT team in a company is usually responsible for setting up and managing the company's SAML authentication system. Their role is to implement SSO for Sounding Board on the system.
Enabling SAML SSO Azure Active Directory
- To log in with SAML, you must create an Enterprise application in the Azure active directory.
- Once in your Azure Active Directory, navigate to ‘Enterprise applications'
- Select ‘New Application’
- Select ‘Create your own application’
- Enter ‘Sounding Board’ for the name of your application, and select ‘Integrate any other application you don’t find in the gallery (non-gallery).’ Then, hit create at the bottom of the menu.
- You should be directed to a new page to configure your SAML application and select ‘Assign Users & Groups.’
- Assign the users or groups you prefer. This will vary based on your company, so we will not provide specific instructions.
- Once you are done assigning the users and groups, click on ‘get started’ under ‘Setup Single Sign On.’
- Select SAML
- You should be brought to a SAML configuration page. Select “Edit” under the “Basic SAML Configuration” section.
- Once you click edit, you should see a menu like this, where we can edit the identifier and the Reply URL:
- Add a unique identifier for the Entity ID; we require: “coaching.soundingboardinc.com,” and the reply URL must be “https://sbx-api. soundingboardinc.com/api/auth/saml/callback”.
- *Please note that if you are setting up SSO in our demo/lower environment, please use the following Reply URL: https://sbx-api-demo.soundingboardinc.com/api/auth/saml/callback. The URL for the lower environment is https://sbx-demo.soundingboardinc.com/. Our lower environment demo site can't invite users, so users must log in via SSO.
- Click save to close the menu and return to the SAML config screen.
- Next, we need to modify the Attributes and claims:
- We need to modify the ‘Unique User Identifier,’ so click the “…”
- Modify the ‘Name Identifier Format’ to ‘unspecified.’ Then change the source attribute to ‘user.mail’ and click save. Please note that whatever property is set for the source attribute should be the user’s email address.
- Your Sounding Board Implementation Partner will need three pieces of information from this page: *see below for screenshot reference
- The Identifier (Entity ID)
- The Base64 encoded certificate, which Azure provides a link for.
- The Login URL
- Additionally, please let your Sounding Board Implementation Partner know what user email addresses will test the SSO integration. Depending on your company's process, you may need to invite these users to Azure for access.
Additional information
- Sign-on URL - our app doesn't require this URL
- Relay State - our app doesn't require this URL
- Logout URL - our app doesn't require this URL
- Metadata URL or Exported XM: The main attribute we need to be passed back to us is the user’s email, the unique identifier in the system.
- Our lower environment demo site can't invite users, so users must log in via SSO. The company must let us know the email addresses of the users that plan on testing SSO. Once we turn on SSO, the URL for the lower environment is https://sbx-demo.soundingboardinc.com/.
- The SAML certificate is good for five years.
User SSO Login Screenshot
Note: The user trying to initiate Company Single Sign On must be a user within the Sounding Board Application; this is based on the email address.