Online Help | Desktop App

Managing single sign-on (SSO) providers

Introduced in 2021.1

Updated in 2024.2

Single sign-on, or just SSO, is an authentication process that improves security and saves time for your users. When SSO is set up, users sign in just one time—to their third-party identity provider (IdP), and then access all their apps, including Alloy Navigator Express apps, directly, without a second sign-in.

Many organizations use an identity provider, such as Microsoft, Google, or Okta, to take advantage of SSO. If you have an identity provider in your org, you can set up SSO in Alloy Navigator Express.

What is SSO in Alloy Navigator Express?

Alloy Navigator Express supports SSO via the OpenID Connect protocol (OIDC SSO). This means that you need an OpenID Connect identity provider (IdP) to handle the sign-in process and provide your users’ credentials to Alloy Navigator Express. Microsoft, ADFS, Okta, and other major identity providers support the OIDC protocol.

Alloy Navigator Express supports OpenID Connect SSO in the Web App, Self Service Portal, and mobile apps. For example, see the sign-in page of the Web App having the SSO via Microsoft enabled.

NOTE: With SSO enabled, users may still be able to sign in using their username (email) and password. To make this happen, the password authentication must be enabled in Alloy Navigator Express for both the web application and the user's account.

Prerequisites

If your organization uses an Identity Provider for SSO service, you can integrate that provider with Alloy Navigator Express. Alloy Navigator Express will serve the IdP as the Service Provider (SP).

These is what you will need to up SSO in Alloy Navigator Express:

  1. You organization has an identity provider for SSO service (a SSO provider) that supports the OpenID Connect protocol.

  2. Alloy Navigator Express users have valid email addresses, and must allow the IdP to know their email addresses. The email attribute is critical for establishing communication between your IdP and Alloy Navigator Express.

  3. The site or sites where Alloy Navigator Express web applications (the Web App, Self Service Portal, and the API) are installed use the HTTPS protocols.

When all prerequisites are met, you can set up SSO in Alloy Navigator Express as described below. Configuration must be done on both the provider's site and in Alloy Navigator Express, so they can share configuration information and communicate with each other.

Setting up SSO in Alloy Navigator Express

To set up SSO in Alloy Navigator Express, you need to integrate your IdP that provides the SSO service (or "SSO provider") and Alloy Navigator Express. Here are the steps you should take, first on the IdP's site and then in Alloy Navigator Express:

Step 1: Register your Alloy Navigator Express app in your identity provider

First, you need to register Alloy Navigator Express apps in your identity provider (IdP) so the IdP can provide authentication and authorization services for Alloy Navigator Express apps and their users.

Each IdP requires its own steps to register (some providers call it "add") apps. For detailed instructions, see the documentation for your identity provider:

Typically, you will need this information for adding Alloy apps.

Parameter Value

Sign-in method

ODIC (or OpenID Connect)
Application type or Platform

Alloy Navigator Express web apps (the Web App and Self Service Portal):

  • Web Application or Web

Alloy Navigator Express mobile apps (Alloy Navigator, Alloy Inventory Scanner, and Alloy Self-Service):

  • Mobile and desktop applications or Native Application or Mobile application.

Redirect URIs (or Sign-in Redirect URIs)

A redirect URI is the location where the identity provider redirects a user's client and sends security tokens after authentication

Alloy Navigator Express web apps (the Web App and Self Service Portal):

  • [Web App URL]/signin-oidc

  • [SSP URL]/signin-oidc

Alloy Navigator Express mobile apps (Alloy Navigator, Alloy Self-Service):

  • http://localhost:4000

Step 2: Create a SSO Provider record in Alloy Navigator Express

To store IdP metadata in Alloy Navigator Express, add a SSO Provider record in Alloy Navigator Express. You can complete this task either in the desktop Settings or the web-based Admin Center.

Here is what you will need to configure your SSO provider in Alloy Navigator Express. All these data are available in your IdP.

  • Client ID: An OpenID Connect client ID provided by your IdP
  • Client secret: A client secret for the Alloy Navigator Express app provided by your IdP
  • Authority: An OpenID Connect endpoint URL (HTTPS protocol must be used)
  • Full Name Claim: The claim where your IdP stores user full names (we need that claim for creating Person records for self-registering Self Service Portal customers)
  • User Name Claim: The claim where your IdP stores usernames (email addresses); those usernames must match usernames (email addresses) in Alloy Navigator Express accounts

To add an SSO Provider record for Microsoft:

To add an SSO Provider record for Okta:

To add an SSO Provider record for AD FS:

To add an SSO Provider record for Google:

To add an SSO Provider record for a custom IdP:

  1. Access your web-based Admin Center or desktop Settings App.

  2. Go to Accounts and Roles > SSO Providers and select New > Custom. The Custom dialog box opens.

  3. In the Name field, enter a name for your SSO provider. Users will see that name in the sign-in dialog as Sign in with [Name].

  4. In Authority field, review (or provide) the service endpoint URL path. Note that it must start with https://. Secured protocol must be used.

  5. Provide the credentials of your Alloy Navigator Express from the IdP:

    • Client ID: The unique identifier that the Alloy Navigator Express app will use when requesting an access token from the IdP.

    • Client Secret: The secret string that the Alloy Navigator Express app will use to prove its identity when requesting an access token from the IdP.

  6. Provide the Full Name Claim and the User Name Claim, so that the Alloy Navigator Express can obtain the user name.

  7. Click OK to save your record.

Now you can configure your Alloy Navigator Express web and mobile applications.

Step 3: Configure the Alloy Navigator Express apps to use SSO

Once you've created the SSO Provider record, enable SSO for the applications you want to use it with. Configure each application separately—the Web App, Self Service Portal, and the API (used by Alloy mobile apps). You will need the web-based Admin Center for this task.

IMPORTANT: Changes to SSO authentication will restart the web application, closing all active connections and potentially causing loss of unsaved data for users. To minimize disruption, consider applying these changes during non-working hours and notifying users in advance.

To configure SSO in the Web App, Self Service Portal, and Alloy mobile apps:

  1. Access the Admin Center.

    TIP: The web-based Admin Center is part of the Web App. To access it, open the Alloy Navigator Web App under an administrator’s account and select Admin Center from the sidebar.

  2. Navigate to Apps and Portals > [Web App / Self Service Portal / API] and go to the Authentication page.

    IMPORTANT: SSO authentication options in the Admin Center are available only when your web apps and portals use the Standard Authentication method (enabled by default). If these options are missing, on-premises customers can enable Standard Authentication via the Web Configuration tool, while cloud customers should contact the Support Team for assistance with this step.

  3. Select the desired SSO providers under Available Single Sign-On services.

    If you want users to also sign in with their username (email address) and password, select the Allow password authentication checkbox under Password Authentication. You may also need to enable password authentication in the user's account.

  4. Click Save and Restart. This will restart the instance to immediately apply your changes.

For example, see how to enable SSO for the Web App in the screenshot below.