Skip to main content
Skip table of contents

Configuring Single Sign-On (SSO)

Overview

Single sign-on (SSO) allows users to sign in once and access Login Enterprise without repeated authentication prompts. Authentication is handled by Microsoft Entra ID, which verifies user identities and manages sign-in.

Using SSO helps streamline the sign-in experience and align authentication with organizational security policies. By using Microsoft Entra ID, organizations can enforce controls such as multi-factor authentication (MFA), reduce password management overhead, and improve overall security.

How SSO works

In Login Enterprise, authentication and authorization are handled separately:

  • Authentication is performed by Microsoft Entra ID through single sign-on (SSO).

  • Authorization is handled by LDAP.

After a user signs in through Microsoft Entra ID, Login Enterprise queries LDAP to determine the user’s group membership, such as whether the user belongs to the right AD groups, to decide what access they should have. For this reason, LDAP must be configured even when SSO is enabled.

Prerequisites

Before configuring single sign-on (SSO), ensure that the following requirements are met:

  • An LDAP configuration is in place. For more information, see Configuring Authentication.

  • LDAP credentials are available.

    • These credentials are optional when saving the LDAP configuration without SSO.

    • These credentials are required when SSO is enabled to query user and group information for role assignment.

  • A Microsoft Entra tenant is available.

  • An enterprise application is created in Microsoft Entra.

Configuring SSO in Microsoft Entra

To use single sign-on (SSO), you must enable SSO for an enterprise application in your Microsoft Entra tenant. This application is used to authenticate users who sign in to Login Enterprise.

For general guidance on configuring single sign-on in Microsoft Entra ID, see the Microsoft documentation.

Configuration options such as multi-factor authentication (MFA), conditional access, and user assignment are managed in Microsoft Entra and are outside the scope of this documentation.

Configuring SSO in Login Enterprise

  1. Sign in to Login Enterprise using the local admin account.

  2. In the Login Enterprise sidebar, navigate to Access Control > SSO configuration.

  3. Configure the following fields:

Field

Description

Type

The protocol used for SSO. Only OpenID Connect is supported.

Name

The identity provider used for SSO. Only Microsoft Entra ID is supported.

Enable SSO login

When disabled, the SSO login option isn’t available on the login page.

Tenant ID

The Microsoft Entra tenant (directory) ID to authenticate users. This value is a GUID and determines which directory is used for sign-in.

Client ID

The application (client) ID of the Microsoft Entra app for SSO.

Client Secret

The client secret for the Microsoft Entra app registration, used to authenticate the application.

Enforce SSO login

When enabled, users can sign in only with SSO or the local admin account. Enforcing SSO login prevents users from bypassing organizational sign-in policies by using local credentials.

Redirect URL

The Login Enterprise-generated URL that Microsoft Entra uses to redirect users after successful sign-in. It cannot be edited in the Login Enterprise, but can be modified when pasting it into the Microsoft configuration. You can add multiple URLs in Microsoft if needed for multiple domains.

  1. Save the configuration.

Frame 1622.png

Testing the Configuration

To verify that SSO is configured correctly:

  1. Sign out of Login Enterprise.

  2. Select Microsoft Account/Entra ID on the login page.

Frame 1621.png
  1. Optionally, confirm that you’re assigned the correct roles based on LDAP group membership.

If the redirect URL is misconfigured, sign-in may fail.

Ensure that the redirect URL configured in Microsoft Entra matches the Redirect URL process field in the Login Enterprise.

Break-Glass Access

The local admin account is always available and can be used to sign in even when SSO is enabled and enforced. This account provides break-glass access in case SSO is unavailable or misconfigured.

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.