Enable SSO with Azure AD as the Identity Provider
Last updated
Last updated
Enabling single sign-on (SSO) for your domain within FeedOtter allows your Users to easily and securely log in to their accounts. This article will help you get set up if your IdP is Azure AD. For more general information on adding and using SSO with FeedOtter, check out Enable SSO in Your Account.
Single Sign-On requires an Enterprise license.
Single sign-on (or SSO) is a way to manage your organization's users, allowing them to authenticate and log in to many different applications with just one set of credentials, rather than having to set up multiple usernames and passwords across different platforms. It allows you to manage your users in a single location at your identity provider and prevents potentially losing or forgetting FeedOtter login credentials, as those are stored through another service.
This section explains step by step how to configure SAML Single Sign-On between Help Scout and a generic Identity Provider. Please see the separate articles listed below for setup instructions if your Identity Provider is Okta, OneLogin, or Azure AD:
Note: Service Provider (FeedOtter) provisioning is not supported. Accounts should be created first in the IdP or FeedOtter, and then authenticated via the IdP prior to logging in to FeedOtter.
You'll need to be the FeedOtter Account Owner to get this setup for your account.
Login to FeedOtter, then navigate to Settings > Company Settings > Security
Enable Single Sign-On via the switch.
Sign in to the Microsoft Entra admin center as at least a Cloud Application Administrator.
Browse to Applications > Enterprise applications and create a new Single Sign-On application
On the Select a Single sign-on method page, select SAML.
Edit the Basic SAML Configuration by clicking on the three dots.
Copy the Post-back URL value from FeedOtter and paste it in the Reply URL input in Azure
Copy the Audience URI value from FeedOtter and paste it in the Identifier (Entity ID) input in Azure.
If you wish to have IDP initiated sign-on, leave the Azure Sign on URL empty. If you wish to have SP initiatied sign-on enter https://app.feedotter.com/sso-login in this box.
Save your changes and return the the FeedOtter IDP application settings main screen.
In Azure scroll down to section 4 - Set up FeedOtter to Entra SAML.
Copy Login URL value from Azure portal, paste it in the Single Sign-On textbox in FeedOtter.
Copy Microsoft Entra Identifier value from Azure portal, paste it in the Identity Provider Issuer / Entity ID textbox in FeedOtter.
In the SAML Signing Certificate section, find Certificate (Base64) and select Download to download the certificate and save it on your computer.
Open the downloaded file and paste the contents into the Certificate / X.509 textarea in FeedOtter.
Click the Save button in FeedOtter to save your settings.
Single Sign-On will now be enabled. Users need to log in via the identity provider prior to logging into FeedOtter.
If you are running to trouble getting a connection please try the following:
In Azure, clear out the "sign on url" input box and leave it empty. Only the identifier and reply url should be filled.
The reply Url should be the assertion url that looks similar to this:
Please save this and try to initiate the login from inside the Azure ui.
It seems adding the "signon" url puts it in SP mode vs IDP initiated.