Configuring Single Sign-on (SSO) using Azure Active Directory
Note: if you are not using Azure Active Directory, see Configuring Single Sign-on (SSO).
Single Sign-on (SSO) enables you to configure your tenancy so that Advance automatically signs in users.
Configuring Single Sign-on requires that you both configure your tenancy to use Single Sign-on and register Advance with your Single Sign-on provider. This topic provides instructions for configuring SSO using Azure Active Directory (AD) as the SSO provider.
Prerequisites
- Create a tenancy – Advance must have at least one tenancy before you can configure Single Sign-on.
 - Azure Active Directory (AD) – you must have Azure AD as your SSO provider
 
To configure Single sign-on
1. Register Advance with Azure AD
You will require this information when configuring SSO in Advance.
- Log in to your Azure Portal.
 - Navigate to Azure Active Directory > App Registrations.
 - Click the New Registration button.
 - Type a name into the Name field to identify the application. For example, HotDocsAdvance.
 - For Supported account types, select the option that best suits.
 -  In the Redirect URI field, type the URI for the Advance auth application for your tenancy, appended with 
/.oidc/callback. For example:https://yourtenancy.yourorganization.com/HdaAuth/.oidc/callback - Click the Register button; Azure redirects you to the Application Overview page, where you can configure your request claims.
 - From the Application Overview page, copy the following information:
      
- MetadataEndpoint – from the OpenID Connect Metadata document field
 - ClientIdentifier – the value in the Application (client) ID field
 
 
The URI is case sensitive and must be lower case.
2. Configuring the Request Claims
- Click Manifest.
 - In the editor, navigate to the optionalClaims section.
 - Replace the optionalClaims section with the following JSON:
      
"optionalClaims": { "idToken": [ { "name": "given_name", "source": null, "essential": true, "additionalProperties": [] }, { "name": "family_name", "source": null, "essential": true, "additionalProperties": [] }, { "name": "email", "source": null, "essential": true, "additionalProperties": [] } ], "accessToken": [], "saml2Token": [] }, - Navigate to the oauth2AllowIdTokenImplicitFlow setting and set its value to true:
"oauth2AllowIdTokenImplicitFlow": true - Click Save.
 
3. Create a new client secret
You must create a new client secret for the new app registration in Azure AD. This is used by Advance to authenticate with Azure AD.
To create a new client secret:
- Click the Certificates and Secrets link in the sidebar.
 - Click the New client secret button.
 - In the Description field, type a description of the new client secret.
 - In the Expires drop-down list, select the expiration time for the new client secret.
 - Click the Add button.
 - Copy the new secret value; you will need it when configuring SSO in Advance.
 
4. Configure SSO for your Advance tenancy
Once Advance is registered with Azure AD, you should now have the following information:
- Metadata endpoint
 - Client identifier
 - Client secret
 
To configure SSO for your tenancy
- Log in to the Advance Auth Application
 - Click the SSO Configuration link in the page header.
 - Click the Create button.
 - Enter the following information into the fields:
      
- Metadata Endpoint – the URL from which to download the OpenID Connect metadata document provided by your identity service
 - Client Identifier – the ID of the client with permissions to access the metadata endpoint
 - Client Secret – the secret for the client
 - IsActive – select the IsActive checkbox to immediately activate SSO on your tenancy; if you leave the checkbox empty, you can still activate SSO later
 
 - Click the Save button; Advance redirects you to the SSO Configuration page.
 - On the SSO configuration page, there is a highlighted URI next to the text The value to provide is. For example, https://yourtenancy.yourorganization.com/HdaAuth/.oidc/callback
Check that this matches the Redirect URI you set when registering Advance with Azure AD. 
Your tenancy is now configured to use Azure AD for single sign-on.