For Pronestor Planner in the cloud, SSO is possible to setup through the customer's Azure AD.
It will enable users to utilize their existing login credentials - and it will allow IT managers to ensure that logins and password policies to be maintained within their Azure AD.
Setting up SSO - is a two-step setup:
1. step requires the customer to allow Pronestor to authenticate towards their Azure AD
2. step requires Pronestor to configure Pronestor Planner to authenticate towards the customers Azure AD
In the example, an imagined customer, Acme Inc, is provisioned on https://<customer_name>.pronestor.com
They are an Office 365 customer with the domain "acme.com". Their Office 365 account is backed by an underlying Azure Active Directory (Azure AD) instance.
1. STEP - [performed by the customer]
The customer must create a new application in Azure AD.
In this guide, we will reference the customer as by acme.com - which should be replaced with customer's domain.
- Login to Windows Azure portal - https://manage.windowsazure.com
- Select “Azure Active Directory” in the left-hand side menu.
- Choose "App registrations"
- Click "+ New application registration"
- In the name field - give your application a name (e.g. Pronestor Planner)
- In application type choose the option “Web app/API"
- Set "Sign - on URL" : https://<customer_name>.pronestor.com>/Booking.NET/Login.mvc/Login
- Click "Create"
- Choose "Settings"->"Properties"
- Copy text from "Home page URL" to "App ID URI"
- Set "Multi-tenanted" to "No"
- Click "Save"
2. STEP - [performed by Pronestor]