SSO for Azure Active Directory
This page walks you through the steps to configure Zus SSO if your organization uses Azure Active Directory as your IDP.
Before you begin
- As a requirement for configuring Zus SSO, customers must attest that multi-factor authentication is required for all users and included in their identity provider's authentication workflow when accessing the Zus domain.
- Only customer users with corresponding Zus auth accounts will be accepted for SSO login.
Configuring SSO
- Go to the EntraID Home page.
- From the Left side bar, go to Identity ā Applications ā App registrations. From here you can create a new App or use an existing one.
- If deciding to choose an existing App, proceed to step 4
- Click New registration.
- Add a Name to your app (e.g. CustomerZusConnection).
- Choose the account type you want (Single Tenant or Multiple Tenant).
- Leave the remaining as is. We will change the Redirect URI later.
- Press register.
- Once the app is created/selected, you will be redirected to the Overview page of the app. Now, to add a new Redirect URI to the app's web authentication, go to Authentication under Manage in the sidebar.
- If there are no redirect URI present, click Add a platform then select Web.
- There are Web Redirect URIs present, click Add URI
- Under Redirect URI enter:
- If setting up for Sandbox - Redirect URI: https://auth.sandbox.zusapi.com/login/callback
- If setting up for Production - Redirect URI: https://auth.zusapi.com/login/callback
- You can enter both into a single workspace to authorize both environments
- Click Configure.
- Click Save at the bottom of the screen.
- To get Client ID:
- On the Overview page, under Essentials, the Application (client) ID will be available. This is the Client ID that will be required by Zus in order to complete the SSO integration.
- To get Client Secret:
- From the sidebar, under Manage, select Certificates & secrets.
- Select New Client Secret.
- Enter a description and the expiration and then click Add.
- For this tutorial, we have used an expiration date of 365 days. Make sure to set a reminder for Zus or customer side to update the client secret after a year.e
- The Value (of the Secret) that was just created will be visible now. This will be the Client Secret that will be required by Zus to complete the SSO integration. Note: This will be the only time the Value will be visible, so it is a good idea to save it in a trusted secrets manager.
- To get Microsoft Azure AD Domain:
- From the sidebar, under Manage, select Branding & properties.
- On this page, the value next to the Publisher domain is the Domain of this app. This will be the Domain that will be required by Zus to complete the SSO integration.
- Share the Domain, Client ID and Client Secret with Zus via a secure channel.
- Other steps that maybe necessary to make a successful connection:
- Make sure the customer has set up the users and groups and added the user they need to test with.
- The admin of the application needs to provide explicit permission to the user.
Updated about 4 hours ago
