Configure Vim Connect SSO Via Azure Active Directory - Vim

Configure Vim Connect SSO Via Azure Active Directory

Intro

In order to improve users’ Vim Connect login experience, your organization can leverage Azure Active Directory Seamless SSO to allow users to seamlessly connect to Vim Connect from corporate devices, without the need for username and password authentication each time Vim Connect starts.

 

Prerequisites

  1. Azure AD Connect server is installed, configured and properly synced with your on-prem Active Directory.
  2. Azure AD Connect Single Sign On feature is enabled and configured.

 

Step 1 – Enabling Single Sign On Feature:

  1. On the Azure AD Connect server, double click the Azure AD Connect icon to launch the wizard:
  2. Click “Configure”
  3. Click “Change user sign-in” then click Next:
  4. Enter Azure AD global administrator username and password:
  5. Mark “Enable single sign-on” and then click next
  6. AD Connect will now ask you to enter a domain administrator credentials for your on-prem active directory. Click “Enter Credentials” and enter a domain administrator credentials, then click Next:
  7. The wizard will then show you a configuration summary, click Configure:
  8. The wizard will now configure single sign-on, when it’s done you will see a “Configuration complete” window. Click Exit to exit the wizard.

Step 2 – Rolling Out SSO

  1. On your GPO Server, Open Group Policy Management Editor tool.
  2. Create a new policy or edit an existing policy that fits the group of users that should access Vim Connect.
  3. Right click the GPO, then click Edit:
  4. Browse to User Configuration > Policies > Administrative Templates > Windows Components > Internet Explorer > Internet Control Panel > Security Page. Then select Site to Zone Assignment List:
  5. Click Enable. Click the Show button next to “Enter the zone assignments here” and then enter the following values in the dialog box:
    Value name: https://autologon.microsoftazuread-sso.com
    Value (Data) : 1
  6. Select OK, and then select OK again:
  7. Browse to User Configuration > Policies > Administrative Templates > Windows Components > Internet Explorer > Internet Control Panel > Security Page > Intranet Zone. Then select Allow updates to status bar via script:
  8. Enable the policy setting and then click OK:
  9. Browse to User Configuration > Preferences > Windows Settings > Registry > New > Registry item:
  10. Enter the following values in the appropriate fields and click OK:
    Key Path: Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\microsoftazuread-sso.com\autologon
    Value name: https
    Value type: REG_DWORD
    Value Data: 00000001
  11. On a test workstation, run gpupdate /force and then check if the url was added to the intranet sites by going to start menu → Internet Options → Security tab → Local Intranet → Sites → Advanced

 

Step 3 – Configuring SSO App In Azure AD

    1. Request the connection identifier of your organization from the Vim team (will be described in the document as CONNECTION_NAME).
    2. Open Azure Portal https://portal.azure.com/, on the right side menu choose “Azure Active Directory”.

      If there is no such service, Open “All services” and type “Azure Active Directory”:
    3. In Active Directory menu choose “Enterprise applications”:
    4. In opened section choose “New Application”:
      Choose “Create your own application”:Pick “Non-gallery application” type:
    5. Type in the name “Vim Connect”
      Select “Integrate any other application you don’t find in the gallery (Non-gallery)”
      and press “Add”.
    6. In your Azure AD enterprise application choose section “Single sign-on”, in dropdown list choose “SAML-based Sign-on”:
    7. In the first section “Basic SAML Configuration” click on edit
    8. In section “Basic SAML Configuration” set next information:
    9. Save your changes and close the form
      ** there might be a bug in the azure screen, please make sure after this step you refresh the page before next step (download the certificate file)
    10. In the “SAML signing Certificate” section, click on “Download” next to the “Certificate (Base64)” and copy the “Login URL” in the next section:
    11. Send the “Certificate” file and the “login URL” to Vim.
    12. In your Azure AD select “Enterprise applications” and choose your application. Select “Users and groups”->“Add user”.
    13. Invite new users or select from existing. These users will be able to login with this Azure
    14. ADD account to Vim Connect. When you finish adding a user, select “Assign”.

 

 

Questions? Contact your Vim representative or reach us at [email protected]