Simployer Azure AD Enterprise SSO Configuration Guide

Modified on Wed, 5 Mar at 2:33 PM

Summary 

This document describes how to configure an Azure Active Directory integration with Simployer 

Enterprise Access. When the configuration has been successfully completed, the users will be able to 

login to the Simployer Portal using SSO (Single Sign-On). 


Prerequisites 

The following prerequisites are assumed in this document: o Admin access in the Azure Portal for the 

tenant where the users are present o Knowledge about Azure Active Directory configuration in the 

Azure Portal 


Information required by Simployer 

When the configuration has been completed, the following information must be provided to 

Simployer: 

  • Client (Application) ID 
  • Directory (Tenant) ID 
  • Client secret 



Instructions 

1. In the Azure Portal, go to Azure Active Directory → App 

registrations → New registration.



2. Enter a suitable name for the application (such as Simployer_SSO) under “Name” and use the following URI as 

the Redirect URI:  https://login.simployer.com/login/callbac




3. Go to “Certificates & secrets” and click on “New client secret”. 


4. Add the new client secret by giving it a suitable description (such as “Simployer SSO Secret”) and select the desired 

expiration time (24 months is a common value) and select “Add”.



5. Make a note of the “Value” shown at this point and save it securely since it can only be viewed immediately after 

creation. Once you browse away from this page, the value will not be visible.



6. Go to “Token configuration” and click on “Add optional claim”.



7. In the “Add optional claim” dialogue, select “ID” as the “Token type” and select the following claims and click 

“Add” 

- email 

- family_name 

- given_name 

- upn 



8. When the claims are added, the following dialogue box will be shown. Make sure that the tick box is activated and click 

“Add”.



9. Click on “API permissions” and click on “Add a permission”.



10. Select “Microsoft Graph” in the API selection dialogue.



Click on “Delegated permissions” and select the following OpenId permissions and click “Add 

Permissions” 

- email 

- openid 

- profile



11. In the newly created enterprise application, go to “Users and groups” and click on “Add user/group” to select which 

users or groups that should have access to Simployer.




12. The customer steps for this configuration have now been completed and you can now provide the required 

information to Simployer using a suitable secure transfer method 

1. Metadata Endpoint 

2. Application (Client) ID 

3. Client secret 


Was this article helpful?

That’s Great!

Thank you for your feedback

Sorry! We couldn't be helpful

Thank you for your feedback

Let us know how can we improve this article!

Select at least one of the reasons
CAPTCHA verification is required.

Feedback sent

We appreciate your effort and will try to fix the article