Send a co-worker an invite to the portal.Just enter their email address and we'll connect them to register. After joining, they will belong to the same company.
You have entered an invalid email address. Please re-enter the email address.
This co-worker has already been invited to the Exchange portal. Please invite another co-worker.
Please enter email address
Send InviteCancel
Invitation Sent
Your invitation was sent.Thanks for sharing Exchange with your co-worker.
These instructions apply to ITA on-premises only. ITA hosted customers can leverage SSO in IT Expert.
Administrators can configure SAML 2.0 SSO on the Configuration > Authentication servers tab in the IT Advisor web client.
Any identity provider (IdP) that supports the SAML protocol is supported.
Once you configure SSO, all users with an email address on one of the domains you specify must use your identity provider to log in to IT Advisor on-premises.
IMPORTANT: It is strongly recommended that at least one Administrator user who does not require SSO to log in is configured in the web client on the Administration > Users tab.
1. Configure your identity provider
Before you configure SSO in IT Advisor, configure the integration with ITA in your identity provider's user interface. Refer to your identity provider's documentation for more information.
After you have added IT Advisor to your authentication providers user interface, configure the authentication server in the ITA web client.
Log in to the ITA web client as an Administrator.
Click the cogwheel in the upper right. Go to Configuration > Authentication Servers > Add Authentication Server.
In Authentication server settings, enter:
Type: Select SAML SSO.
See the documentation for your IdP provider. Azure is used in the examples below.
Name: The name of the server, for example, Azure SSO
Service provider ID/Application ID/ Client ID: The UUID of IT Advisor in IdP. In Azure, copy the value from the Application (client) ID field.
IdP Federation metadata document URL: SAML metadata is an XML document that contains information necessary for interaction with the SAML-enabled identity or service providers, for example, URLs of endpoints, information about supported bindings, identifiers and public keys. In Azure, copy the value from Application (client) ID field.
Default ITA user group name: Enter the ITA user group where the authorized users are assigned. Only one group name can be entered. If this value is defined, Mapping of IdP tenant group’s names to ITA group’s names is ignored. If this value is not defined, the group(s) defined in Mapping of IdP tenant group’s names to ITA group’s names are used.
Mapping of IdP tenant group name to ITA group names: If the value for Default ITA user group name is not defined, this mapping is used to assign users to defined group(s) in ITA. Use an equals sign = to separate group names, and use a semicolon ; to separate each mapping.
Note: If both the Default ITA user group name and Mapping of IdP tenant group name to ITA group names valuesare not defined, or the group’s names are incorrect, users are not automatically assigning to any group in ITA.
ITA endpoint URL callback: A SAML Assertion is the XML document the identity provider sends to the service provider that contains the user authorization.
In ITA, it must always start with https and end with /api/current/authentication/saml2-callback. For example, https://address
SAML Request certificate: SAML request signing certificates are X.509 certificates used in SAML responses to allow the Service Provider (SP) to verify the authenticity of a SAML response.
In Azure, the value from federation metadata with the additional prefix ”-----BEGIN CERTIFICATE----- ” and suffix “-----END CERTIFICATE-----”
SAML Request certificate issuer: The issuer of the request certificate. In Azure, the value from federation metadata in the attribute “EntityDescriptor@entityID”