To set up SSO for Keepit, you must first create and configure an SSO application in Azure ADFS. During the configuration you will obtain the IDP URL and certificate needed to configure SSO in Keepit. 

Important: Before starting the SSO setup, make sure you have a Microsoft Azure account with Azure AD Premium activated so that you can add non-gallery applications.

I. Create an Azure application for SSO

  1. Sign in to the Azure portal.
  2. Browse to Azure Active Directory > Enterprise applications.
  3. Select +New application at the top.
  4. Select Non-gallery application.
  5. Under Add your own application, enter a name for the application, and click Add.
  6. Select Single sign-on from the application's left-hand navigation menu.
  7. Under Select a single sign-on method, select SAML.
  8. In the Basic SAML Configuration box, click the pencil icon to open the configuration window.
  9. In the Identifier field, enter the identifier that corresponds to your data center:
    Denmark (Copenhagen):
    United States (Washington, DC):
    Australia (Sydney):
    United Kingdom (London):
    Germany (Frankfurt):
  10. In the Reply URL field, enter the URL that corresponds to your data center:
    Denmark (Copenhagen):
    United States (Washington, DC):
    Australia (Sydney):
    United Kingdom (London):
    Germany (Frankfurt):
  11. Select Save.
  12. In the SAML Signing Certificate box, click Download to the right of Certificate (Base64) and the certificate with a *.cer extension will download to your computer.
  13. In the Set up SSO Demo box, locate the Login URL. This is the IDP URL that you need to configure SSO in Keepit.Alternatively, you can click View step-by-step instructions to open the Configure sign-on guide on how to configure SSO in Keepit with Azure AD. Here the IDP URL is named SAML Single-Sign On Service URL.

II. Assign users in Azure ADFS

For SSO to be enabled for individual users, you must assign these users to your SSO application in Azure ADFS.

  1. Sign in to your Azure account.
  2. Select Enterprise applications.
  3. Find the application you created for SSO and click the name.
  4. Under Manage, select Users and groups.
  5. Click + Add user, and the Add Assignment window will open.
  6. Select Users and groups None Selected.
  7. Search for the users you want to be able to use SSO in the field provided, and then select them from the list below. Here you may include the Master Administrator (the Global Admin who is setting up SSO) as well as all other users for whom you want to enable SSO.
  8. When all desired users appear under Selected members, click the Select button.  
  9. The number of users you selected will appear under Users and groups
  10. Select the Assign button.

III. Ensure Azure AD users exist in Keepit

  1. Sign in to Keepit with a Master administrator account.
  2. In the lower-left corner, click the account profile > Account info.
  3. Select the Users tab.
  4. In the list of users, make sure that all the users that were assigned to the Azure application exist in Keepit. If there is no such user, then create a user with the same name and email address (this should be the same as the User Principal name) as the user in Microsoft 365.

Important: Keepit is case sensitive so when creating a new user in Keepit, make sure the email address is in the same case as the email address (User Principal name) in the Active Directory.

Now you are ready to configure SSO in Keepit. For a step-by-step guide, see Configure SSO in Keepit.