Contents:
How to setup SSO connection via EntraID (Azure AD)
Step 1 - Register your workspace on StoriesOnBoard
Visit StoriesOnBoard Registration to Create your workspace
Step 2 - Claim a new domain on StoriesOnBoard
Login into your StoriesOnBoard workspace
Navigate to "Advanced settings"
Select "Domain control"
Proceed with "Claim a new domain" option
Fill out the domain details, including:
Company name
Domain name
Set Verification method for "Ownership validator file upload "or DNA
Select "Save"
Then "Verify" the domain you created
⚠️ IMPORTANT ⚠️
Please note upon a successful verification on your end, our team will also need to approve your domain manually. Please wait for our approval. Once it is approved you can proceed the setup.
Step 3 - Access domain configuration in StoriesOnBoard
After verification proceed with "Configure"
Select the "SSO settings" tab
"Enable SAML 2.0 Single Sign On"
Select "SP MetaData" tab - you will need to copy fields from here
Step 4 - Create Enterprise application in EntraID (Azure AD)
Login to https://portal.azure.com
Select "Enterprise applications"
Click on "New application"
Select "Create your own application"
Enter your application name
Proceed with "Create"
Select the "Set up single sign on" option
Click on "SAML"
Edit "Basic SAML Configuration"
Copy Entity ID from StoriesOnBoard and paste it
Copy Login URL (ACS) from StoriesOnboard and paste it into the "Assertion Consumer Service URL" field
Copy Logout URL (SLO) from StoriesOnBoard and paste it into the "Logout URL" field
Click on "Save"
Download "Federation Metadata XML"
Visit "Users and Groups" and assign users to your application
Step 5 - Configure your domain in StoriesOnBoard
Go back to StoriesOnBoard to Configure domain settings > SSO Settings
Paste the "Federation Metadata XML" into "Identity Provider MetaData" field
Enter First name attribute as : http://schemas.xmlsoap.org/ws/2005/05/identity/claims/givenname
Enter First name attribute as : http://schemas.xmlsoap.org/ws/2005/05/identity/claims/surname
Save your settings
Step-by-step guide to setup SSO connection EntraID (Azure AD)
Step 1 - Register your workspace on StoriesOnBoard
Visit StoriesOnBoard Registration to Create your workspace.
Step 2 - Claim a new domain on StoriesOnBoard
Go to settings and select "Advanced settings" then "Domain control".
Proceed with "Claim a new domain".
Enter your "Company Name", then enter your "Domain name" and proceed with the "Ownership validation file upload" option or DNA approach and "Save" your settings.
Click to "Verify" your domain and complete verification.
⚠️ IMPORTANT ⚠️
Please note upon a successful verification on your end, our team will also need to approve your domain manually. Please wait for our approval. Once it is approved you can proceed the setup.
Step 3 - Access domain configuration in StoriesOnBoard
Once after our team approved your domain, the domain must be configured as following.
Visit the "SP MetaData" tab. You will be asked later to copy data from this tab and paste it into Azure.
Step 4 - Create Enterprise application in EntraID (Azure AD)
Login to https://portal.azure.com then select the "Enterprise applications" menu.
Proceed with "New application".
Then select "Create your own application".
Enter your application's name as following and select "Create".
Proceed with the "Set up single sign on" option.
Then select "SAML".
Navigate to "Basic SAML Configuration" and click on "Edit".
Open StoriesOnBoard as it displayed in Step 3 and access domain configuration to copy and paste the following information to Azure:
EntityID
Login URL (ACS)
Logout URL (SLO)
Then save your settings.
Then download "Federation Metadata XML".
Now you can visit "Users and Groups" and assign users to your application.
Go back to StoriesOnBoard to domain configuration and select "SSO settings". Enable SAML 2.0 Single Sign On.
Fill the following information:
First name attribute: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/givenname
Last name attribute: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/surname
Then paste the content of the "Federation Metadata XML" into the "Identity Provider MetaData" field and "Save" your settings.
Now you can take advantage of SSO connection via EntraID (Azure AD).