Skip to main content

Enterprise App Store SSO Authorization

Introduction

Managing user groups within Auth0 provides users and organizations with several benefits. By organizing users into groups, administrators can efficiently manage access permissions for various applications and resources, saving time and effort. Administrators can synchronize Auth0 user groups with Appcircle, allowing for granular access control and group-based permissions. This integration enhances security, simplifies access management, and promotes collaboration within organizations utilizing the Appcircle platform.

Summary of Configuration Steps

This section provides a brief summary of the configuration steps.

  1. Perform identity provider-specific configurations, including creating groups, and defining group claims/attributes.
  2. In Appcircle, specify the Claim Name (OpenID)/Attribute Name (SAML) according to your Identity Provider configuration.
  3. In Appcircle, enable SSO Authentication for Enteprise App Store and Testing Distribution.

Specific Provider Configuration

Auth0
Auth0 (OpenID Connect)

Step 1. Create Organizations

  1. In the Auth0 dashboard, navigate to the Organization section.
  2. Click Create Organization button to create organizations.
Screenshot
  1. Click created organization to navigated Organization Details.
  2. On the Organization Details screen, click on the Members tab to manage members of organization.
  3. Click the Add Members button. Add users who will become members of your organization.
Screenshot
  1. On the Organization Details screen, navigate to the Connections tab.
  2. Click the Enable Connections button
  3. Select Username-Password-Authentication and click on Enable Connection
Screenshot
  1. Select Enable Auto-Membership and Enable Signup on the displayed screen, then click Save.
Screenshot

Step 2. Enable organization for your application

  1. In the Auth0 dashboard, navigate to the Applications section.
  2. Select the relevant application.
  3. On the Application Details screen, navigate to the Organizations tab.
Screenshot
  1. Click Disable Grants Now.
  2. Choose Business Users for the type of users and select Prompt for Organization for the login flow.
  3. Click Save Changes.
Screenshot

Step 3. Define Group Claim Name in Appcircle

  1. Navigate to the Organization > Security > Authentications section on your dashboard.
  2. Select the Manage on the Enterprise Portal SSO Login.
Screenshot
  1. Select the Manage Authorization.
Screenshot
  1. Enter the Claim Name (OpenID)/Attribute Name (SAML) as org_id.
Screenshot
Auth0 (SAML)

Step 1. Create Organizations

  1. In the Auth0 dashboard, navigate to the Organization section.
  2. Click Create Organization button to create organizations.
Screenshot
  1. Click created organization to navigated Organization Details.
  2. On the Organization Details screen, click on the Members tab to manage members of organization.
  3. Click the Add Members button. Add users who will become members of your organization.
Screenshot
  1. On the Organization Details screen, navigate to the Connections tab.
  2. Click the Enable Connections button
  3. Select Username-Password-Authentication and click on Enable Connection
Screenshot
  1. Select Enable Auto-Membership and Enable Signup on the displayed screen, then click Save.
Screenshot

Step 2. Enable organization for your application

  1. In the Auth0 dashboard, navigate to the Applications section.
  2. Select the relevant application.
  3. On the Application Details screen, navigate to the Organizations tab.
Screenshot
  1. Click Disable Grants Now.
  2. Choose Business Users for the type of users and select Prompt for Organization for the login flow.
  3. Click Save Changes.
Screenshot

Step 3. Define Group Attribute Name

  1. Navigate to the SSO Login screen in Appcircle.
  2. Enter the Claim Name (OpenID)/Attribute Name (SAML) as http://schemas.auth0.com/org_id.
Screenshot
Microsoft Entra ID (formerly Azure Active Directory)
Microsoft Entra ID (SAML)

Step 1. Create Groups in Microsoft Entra ID

  1. Log in to Azure as an admin and navigate to Azure Services > Microsoft Entra ID
Screenshot
  1. Navigate to the Manage > Groups section from left menu.
  2. Click the New Group.
Screenshot
  1. Assign a proper name and description to the new group. Designate an owner and members to the group.
Screenshot

Step 3. Assign user and group to application in Microsoft Entra ID

  1. Navigate to the Azure Services > Microsoft Entra ID.
  2. Navigate to the Manage > Enterprise applications section from left menu.
Screenshot
  1. Click your application.
Screenshot
  1. Click Assign users and groups.
Screenshot
  1. Click Add user/group.
Screenshot
  1. Select users, groups and role. This process can be repeated as needed.
Screenshot

Step 4. Define Group Attributes & Claims in Microsoft Entra ID

  1. Navigate to the Manage > Single sign-on section from left menu.
  2. Click Edit in Attributes & Claims section.
Screenshot
  1. Click the Add a Group Claim.
  2. Select the Groups assigned to the application
  3. Select the Cloud only group display names as source attribute.
  4. Then click on the Save button
Screenshot

Step 5. Define Group Attributes names in Appcircle

  1. Navigate to the Organization > Security > Authentications section on your dashboard.
  2. Select the Manage on the Enterprise Portal SSO Login.
Screenshot
  1. Select the Manage Authorization.
Screenshot
  1. Enter the Claim Name (OpenID)/Attribute Name (SAML) as http://schemas.microsoft.com/ws/2008/06/identity/claims/groups.
Screenshot
Okta
Okta (OpenID Connect)

Step 1. Create Groups and Define Group Claim

  1. Navigate to the Directory > Groups section in the Okta Dashboard
  2. Create the groups as needed.
Screenshot
  1. Assign users to groups.
Screenshot
  1. Navigate to the Applications > Applications section from left navigation menu.
  2. Select your application from the list
  3. Navigate to the Sign on tab.
  4. Click Edit for OpenID Connect ID Token.
Screenshot
  1. Enter Groups claim filter as shown in the image below.
Screenshot
  1. Navigate to the Applications > Applications section from left navigation menu.
  2. Click Refresh Application Data.
Screenshot

Define Group Claim in Appcircle

  1. Navigate to the Organization > Security > Authentications section on your dashboard.
  2. Select the Manage on the Enterprise Portal SSO Login.
Screenshot
  1. Select the Manage Authorization.
Screenshot
  1. Enter the Claim Name (OpenID)/Attribute Name (SAML) as groups.
Screenshot
Okta (SAML)

Step 1. Create Groups and Assign to the Application

  1. Navigate to the Directory > Groups section in the Okta Dashboard. Create the groups as needed.
Screenshot
  1. Assign users to groups.
Screenshot
  1. Navigate to the Applications > Applications section from left navigation menu.
  2. Select your application from the list
  3. Navigate to the Assignments tab.
  4. Assign the previously created groups to the application.
Screenshot

Step 3. Define Group Attributes

  1. Navigate to the Applications > Applications section.
  2. Select your application from the list and navigate to the General tab.
  3. Click on Edit in SAML Settings
Screenshot
  1. Enter the Group Attribute statement as as shown in the image below.
Screenshot

Step 4. Define Group Claim in Appcircle

  1. Navigate to the Organization > Security > Authentications section on your dashboard.
  2. Select the Manage on the Enterprise Portal SSO Login.
Screenshot
  1. Select the Manage Authorization.
Screenshot
  1. Enter the Claim Name (OpenID)/Attribute Name (SAML) as groups.
Screenshot

Testing and Troubleshooting

After configuring Authorization with SSO for Enterprise App Store, it is important to test the integration to ensure that users authorization work seamlessly and as expected. Follow Enterprise App Store Documentation to test the integration.