Configure HULFT Square to log in with SSO

HULFT Square supports single sign-on (SSO) that uses Microsoft ADFS (Active Directory Federation Service) and Microsoft Entra ID (formerly Azure Active Directory).

In order to be able to log in with SSO, first configure ADFS or Microsoft Entra ID, and then configure SSO in HULFT Square.

For details about how to configure ADFS, refer to Set up ADFS to log in with SSO in the tutorials.

For details about how to configure Microsoft Entra ID, refer to Set up Microsoft Entra ID (formerly Azure Active Directory) to log in with SSO in the tutorials.

This scenario describes the settings that HULFT Square administrators need to configure to enable SSO in HULFT Square.

Description

Points for using SSO

Because HULFT Square manages users by groups, all users must belong to a group. If a user who doesn't have a HULFT Square account logs in to HULFT Square for the first time with SSO, a user account is created when that user logs in. That user must be assigned to a group.

In this tutorial, you will create a security group on the Active Directory side or the Microsoft Entra ID side to which SSO users belong and map them to the group on the HULFT Square side so the users are mapped to the specified group.

Note
  • In order to configure SSO, the SSOFullAccess policy, which contains the ViewSSO and EditSSO permissions, needs to be assigned.

  • Users with SSO enabled can't log in by password or multifactor authentication (MFA).

    When users with SSO enabled log in to HULFT Square using SSO, the following functions are disabled:

    • Multifactor authentication

    • Invitation of users

    • Password change

    • Password policy

  • As a precaution in case the SSO function becomes unusable, SSO isn't enabled for users who have the EditSSO permission. They must always log in with a password.

    It's strongly recommended that they ensure security by taking measures such as also using multifactor authentication.

  • The username is case sensitive.

Steps and what to do

If this is your first time using SSO, it's recommended to apply SSO to a specific group of users first to confirm the usability before applying it to all users. This tutorial is described as a scenario in which you enable SSO for a specific group and then enable SSO for all groups.

Perform the work in the following procedures:

Procedures

Enable SSO for a specific group

To check the usability when SSO is enabled, enable SSO for a specific group.

(1) Set up ADFS or Microsoft Entra ID (formerly Azure AD) to log in with SSO

For the ADFS setup procedure to log in with SSO, refer to Set up ADFS to log in with SSO in the tutorials.

For the Microsoft Entra ID setup procedure to log in with SSO, refer to Set up Microsoft Entra ID (formerly Azure Active Directory) to log in with SSO in the tutorials.

(2) For users who configure SSO, set the EditSSO permission

For details about how to set policies to users and groups, refer to Set up users and groups.

(3) Enable SSO for a specific group

  1. Select > USER MANAGEMENT > Single Sign-On.

  2. On the Single Sign-On page, select Edit.

  3. On the edit page of Single Sign-On, specify the SSO information.

    Set the following values here and select Apply.

    Field name

    Setting (example)

    Status

    On - Specific Group

    Group

    HULFT_Square_Users

    IdP

    ADFS or Microsoft Entra ID

    Email Domain

    Set the email domain of the organization which you belong to.

    Federation Metadata URL

    • For ADFS

      https://<adfs-server-url>/FederationMetadata/2007-06/FederationMetadata.xml

    • For Microsoft Entra ID

      Enter the value for App Federation Metadata Url under SAML Certificates.

(4) Contact the users to convey the HULFT Square login URL

Contact the members who belong to the specific HULFT_Square_Users group and convey the HULFT Square login URL. Ask them to check whether they can log in using SSO.

 

On one of the following login screens, enter the email address registered in Active Directory or Microsoft Entra ID and the password for it.

  • For ADFS

  • For Microsoft Entra ID

 

Check to make sure the users are able to log in.

Enable SSO for all groups

After confirming the usability of SSO with a specific group, enable SSO for all groups.

Inviting users when SSO is enabled

Users who have SSO enabled must be invited via SSO.

Add the users you want to invite to HULFT_Square_Users of Active Directory or Microsoft Entra ID and contact them to convey the HULFT Square login URL.

Although users who have the EditSSO permission can invite users from > USER MANAGEMENT > Users, they should be invited via SSO as described above.

(5) Add users to the security group of Active Directory or Microsoft Entra ID in your environment

Add all the users to the HULFT_Square_Users security group of Active Directory or Microsoft Entra ID in your environment created in step (1) .

(6) Enable SSO for all groups

  1. Select > USER MANAGEMENT > Single Sign-On.

  2. On the Single Sign-On page, select Edit.

  3. On the edit page of Single Sign-On, specify the SSO information.

    Set the following values here and select Apply.

    Field name

    Setting (example)

    Status

    On - All Groups

    IdP

    ADFS or Microsoft Entra ID

    Email Domain

    Set the email domain of the organization which you belong to.

    Federation Metadata URL

    • For ADFS

      https://<adfs-server-url>/FederationMetadata/2007-06/FederationMetadata.xml

    • For Microsoft Entra ID

      Enter the value for App Federation Metadata Url under SAML Certificates.

(7) Contact the users to convey the HULFT Square login URL

Contact all the members added in step (5) and convey the HULFT Square login URL. Ask them to check whether they can log in using SSO.

Check to make sure the users are able to log in.

(8) Add the users to the appropriate groups

Assign the users to the appropriate groups in > USER MANAGEMENT > Groups.