Single Sign-On is available in Primalogik for all cloud-based Microsoft accounts without the need for any configuration. Users can click the "Login with Microsoft" button on the login page to initiate authentication via the OpenId Connect standard.
Primalogik implements the SCIM 2.0 user management API, which enables external systems such as Azure AD to automatically provision users in it. To enable user provisioning through Azure AD, you must first log in to Primalogik and follow these steps:
- Go to "Manage Account" > "Integrations"
- Click "Configure" next to "Microsoft Azure AD"
- Click the "Generate" button to create a new Secret Token if you don't already have one, then click Save
- Keep that screen open as you will need to copy the "Tenant URL" and "Secret Token" values to Azure AD in the next step
Next login to your Azure AD portal and create a new Enterprise Application called "Primalogik". Edit the Provisioning settings and copy the values of the "Tenant URL" and "Secret Token" fields from Primalogik to the corresponding fields under the Admin Credentials section in Azure AD.
Once configured, user provisioning must be managed from the Azure AD portal. Users must be assigned to the Primalogik Enterprise App in Azure before they can be provisioned. See the Azure AD documentation for more information about how provisioning works and how to use it.