Configuring Microsoft SSO

Adding Gatekeeper to your Azure Microsoft Apps

Head to your Enterprise Applications

  1. Hit ➕ Create your own application
  2. Under Basic SAML Configuration populate the below values
    1. Entity ID: Take the 4 digits from your tenant's Gatekeeper URL
    2. Reply URL:
      1. If US: https://us.gatekeeperhq.com/users/auth/microsoft_oauth2
      2. If Canada: https://ca.gatekeeperhq.com/users/auth/microsoft_oauth2
      3. If Europe: https://eu.gatekeeperhq.com/users/auth/microsoft_oauth2
      4. If APAC: https://apac.gatekeeperhq.com/users/auth/microsoft_oauth2
  3. Click Save

See Microsoft's article here for guidance

Configuring Gatekeeper

Once you have validated that this app has been set up successfully and that users can authenticate via SSO, you can lock your Gatekeeper environment so that Microsoft SSO is the only valid login option:

  1. Login to your Gatekeeper account as an administrator.

   2. Navigate to Settings > Configuration > Authentication:

configuration-1

3. Select Require Microsoft Sign On (SSO):

Note: If you would like to allow the use of simple username & password and Microsoft SSO authentication methods, select the "Standard" or "Allow All" authentication options

4. Click Save

 

Login to Gatekeeper with Microsoft

  1. Go to https://gatekeeperhq.com/users/sign_in and you will be prompted to sign-in with your Microsoft Account:

Note, if you have selected the Standard, or Allow all option then you be presented with the following screen where you can select to sign-in with your Microsoft account.

2. Select your Microsoft account.

downloads.intercomcdn

3. You are now logged in to Gatekeeper via your Microsoft account!

 

NB.

Access to the Supplier Portal remain via username & password , even when SSO authentication is set.

Access to the Employee Portal via Google SSO, MS SSO & Username & Password can be enabled/disabled in the Just In Time Provisioning settings screen