Single Sign-on Setup

Introduction

If your company uses Microsoft Active Directory (on-premise), or Entra ID (cloud-based), or any other identity provider (IdP), whether on-prem or cloud-based, you can enhance security and make life easier for yourself and your portal users with our single sign-on (SSO) support. We support all common identity providers either directly or through generic SAML 2.0.

When you add a portal user and assign them a single sign-on option, there is no password to worry about – and if your identify provider supports IdP-initiated login, they will not even need to know their username.

We currently support:

  • Microsoft 365 / Entra ID (formerly Azure AD)

  • Active Directory Federation Services (ADFS)

  • Okta

  • SAML 2.0 (any other identity provider using our generic SAML integration)

The procedures in this section work well for a small number of users entered manually. If you need to assign a large number of users using SCIM, refer to SCIM.

Enterprise Applications

Enterprise application access is not just about "can users log in?" It is about:

  • where authentication happens

  • which identity provider (IdP) controls policy

  • how MFA is enforced, and

  • how access is separated between admin workflows and end-user workflows.

For Admin By Request (ABR), this is important because ABR has two different identity interfaces:

  1. Portal access (administrators and portal users)

  2. Endpoint access (standard user elevation approval/authentication, i.e. for end users requesting admin rights)

These two interfaces require different trust paths, different IdP app settings and, in many enterprises, different risk policies.

What is an Enterprise Application?

In Entra ID, Okta, and similar IdP platforms, an Enterprise Application is the local "identity object" that governs how your organization interacts with a specific service.

It functions as the Service Principal (the term Microsoft uses in Entra ID), which is a security identity that defines:

  • Authentication Protocol: The "language" used (SAML 2.0, OIDC, or Password Vaulting).

  • Security Boundaries: The "redirect/reply URLs" that ensure data is only sent to trusted endpoints.

  • Data Payload: The specific "user attributes" (i.e. Claims) the app needs to function (e.g. Email, EmployeeID, or Role).

  • Access Control: The specific "users or groups" assigned to the app and the "conditional access policies" they must meet.

  • Permissions: The "level of consent" granted to the app to read your organization's data (e.g. "Read your calendar").

In other words: an enterprise app is the "identity contract" between your IdP and a particular service.

What is SSO?

Single Sign-On (SSO) means users authenticate once with the IdP, then use trusted tokens/assertions to access one or more apps without retyping credentials each time.

Common protocols:

  • OIDC/OAuth 2.0: used for modern web sign-in and APIs

  • SAML 2.0: used for enterprise federation and policy-controlled sign-in

Why do enterprises sometimes use two apps for one vendor?

A standard pattern is:

  • App A for admin/portal access

  • App B for endpoint/client/user workflow authentication

This split exists because requirements differ:

  • Different protocols

  • Different redirect URLs

  • Different consent models

  • Different conditional access policies/MFA requirements

For ABR, this split is normal and you should expect to see two apps created.

How SSO works in Admin By Request

ABR typically appears as two apps (they are more like "integration paths") in Entra/IdP contexts:

  1. ABR Web Portal admin login app

  2. ABR SSO endpoint app for elevation authentication

Another way to think about it:

  1. Portal SSO: "How admins and portal users sign in to the ABR web portal"

  2. Endpoint SSO: "How endpoint users satisfy identity + MFA for elevation requests"

ABR SSO types: Portal vs Endpoint

ABR supports two SSO use cases that are easy to confuse if they are configured in the same tenant at the same time:

  • Portal SSO and Endpoint SSO require different SAML URLs and metadata.

  • Reusing the wrong app metadata/URLs in Endpoint setup can trigger errors (for example, auth context mismatch errors).

ABR SAML endpoint values

Use the values that match the ABR SSO type you are configuring.

1. Portal SSO
  • Single sign-on URL: https://www.adminbyrequest.com/saml

  • Metadata URL / Entity reference: https://www.adminbyrequest.com/samlmeta

2. Endpoint SSO
  • Single sign-on URL: https://sso.adminbyrequest.com/saml

  • Metadata URL / Entity reference: https://sso.adminbyrequest.com/samlmeta

Architecture and security implications

Using separate enterprise apps gives ABR deployments cleaner control:

  • Isolation: Endpoint SSO misconfiguration does not have to break portal login (and vice versa)

  • Policy granularity: stricter controls can be applied to privileged/portal admins

  • Auditable separation: clearer logs for admin console authentication vs elevation authentication

This is consistent with enterprise "management vs execution" best practice.

The MFA Requirement

If configuring SSO for both Portal Administrators and Endpoint Users, Multi-Factor Authentication (MFA) is required. If MFA is not configured, the drop-down menu at the top of the Single Sign-on (SSO) Setup page is not available:

To check your MFA setting in the portal, go to Endpoint Privilege Management > Settings > Windows Settings > Endpoint > UAC.

IMPORTANT

At the time of writing, MFA must be enabled in Windows Settings to enable the SSO drop-down menu, even if MFA is already enabled under Mac and/or Linux settings. The Windows setting can be either global or a sub-setting.

General prerequisites (before starting any procedures)

Decide your ABR SSO model before configuration:

  1. List your ABR use cases:

    • Portal login only

    • Endpoint elevation SSO only

    • Both

  2. Identify IdP(s) in scope (Entra ID, Okta, other SAML provider).

  3. Decide if the same IdP tenant will host both Portal and Endpoint apps.

  4. Create naming standards up front (for example: Portal SSO, Endpoint SSO).

  5. Document which ABR URL set belongs to which app (Portal vs Endpoint).

This ensures no ambiguity when admins copy metadata and settings into ABR.

Microsoft 365 / Entra ID

Microsoft 365 supports integration with your in-house Active Directory, enabling users to access Microsoft 365 services using their standard AD login credentials. This connection is established through SAML authentication.

To add a Microsoft 365 login, you simply pick it as the sign-on method in the portal when adding a new user without any further configuration. The portal menu option to add a new user is Logins > User Logins.

Microsoft 365 login requires that users are allowed to consent to apps. You can enable this under Users and groups / User settings in the Azure Active Directory (Entra ID) Admin Center. Once all portal users have logged into the portal, the option to consent to apps can be disabled without affecting future logins.

Refer to Entra ID Support for more information.

Entra ID without Microsoft 365

It is possible to login using Entra ID without using Office 365.

Prerequisites
  • A user account in the ABR portal, with sufficient rights to configure SSO:

    • Read-only view: OFF

    • Manage Settings: ON

    • Manage portal users: ON

  • A valid account for the Entra ID portal as well as the ABR portal. Make sure you are logged-in to both portals - you will switch between them during the configuration procedure.

  • All your users who intend to login using Entra ID SSO must have their accounts and/or email addresses entered into your Entra ID portal. This makes them available to be assigned to the Admin By Request app once it is configured.

Procedure

The tasks below are labeled the same as the sections in the ABR portal. Each task comprises a number of steps.

Test your SSO configuration by logging-in as several users and verify that they can login successfully.

Active Directory Federation Services (ADFS)

Active Directory Federation Services (ADFS) is a Windows Server feature that enables your in-house Active Directory users to authenticate with external web applications via SAML, allowing them to log in using their regular AD credentials.

Prerequisites
  • A user account in the ABR portal, with sufficient rights to configure SSO:

    • Read-only view: OFF

    • Manage Settings: ON

    • Manage portal users: ON

  • A functional ADFS setup within your Windows server environment, including administrative access to the ADFS server.

Make sure you are logged-in to both the ADFS server and the ABR portal - you will switch between them during the configuration procedure.

Procedure

The tasks below are labeled the same as the sections in the ABR portal. Each task comprises a number of steps.

Test your SSO configuration by logging-in as several users and verify that they can login successfully.

Okta

Okta is an identity management platform that can connect your in-house Active Directory to external web applications using SAML. This integration allows users to authenticate with their usual AD credentials when accessing the portal.

Prerequisites
  • A user account in the ABR portal, with sufficient rights to configure SSO:

    • Read-only view: OFF

    • Manage Settings: ON

    • Manage portal users: ON

  • MFA configured as the authentication mechanism under Endpoint Privilege Management > Settings > Windows Settings > Endpoint > UAC (global or a sub-setting).

  • A valid account for the Okta portal as well as the ABR portal. Make sure you are logged-in to both portals - you will switch between them during the configuration procedure.

  • All your users who intend to login using Okta SSO must have their accounts and/or email addresses entered into your Okta portal. This makes them available to be assigned to the Admin By Request app once it is configured.

  • Windows endpoints:

    • 8.5 or later

    • On-premise or Active Directory

  • macOS endpoints:

    • 5.2 or later

    • Platform SSO

Procedures

Test your SSO configuration by logging-in as several users and verify that they can login successfully.

Generic SAML

Security Assertion Markup Language (SAML) is an open standard that allows your in-house Active Directory to authenticate users with external web applications. This enables users to log in to the portal using their standard AD credentials.

If you are not using O365, Azure AD, AD FS or Okta, we do support SSO with any SAML identity provider. This means you can easily integrate with any SAML single sign-on provider, such as DUO, F5, Netscaler, One login, Idaptive or RSA.

Prerequisites
  • You need valid accounts for both the ABR portal and the SAML portal you intend to use. Make sure you are logged-in to both portals - you will switch between them during the configuration procedure.

  • Check login requirements for users - it's likely that all your users who intend to login using SAML must have their accounts and/or email addresses already entered into that system and available to be assigned to the Admin By Request app once it is configured.

Procedure
  1. To set up generic SAML SSO, you simply create a SAML single sign-on domain with Generic SAML as the provider in the Single Sign-on Setup page in your ABR portal.

  2. If your IdP supports automatic configuration, download our metadata at https://www.adminbyrequest.com/samlmeta.
    If not, then use the following settings:

    • Consumer URI: https://www.adminbyrequest.com/saml

    • Service Provider Entity ID: https://www.adminbyrequest.com/samlmeta

    • NameID format: E-mail address

  3. After setting up the service provider, download the IdP / Federation metadata as XML and upload it to on the Single Sign-on Setup page and assign the login to users.

Operational best practices

  • Keep Portal and Endpoint SSO app registrations separate and explicitly named.

  • Use change control with screenshot capture of SAML settings.

  • Pilot with a small user group before tenant-wide rollout.

  • Keep one rollback method (temporary ABR MFA fallback) during cutover.

  • Track ABR release notes before major SSO changes.

Questions?

If you have questions not answered on this page, please contact us using the chat or the contact menu at the top.

References

Admin By Request
Microsoft
Okta
Apple