What is single sign-on? What is involved in the integration?Single sign-on is an authentication scheme that allows a user to log in with a single ID and password to any of several related, yet independent, software systems. You must be signed into the Microsoft Entra admin center as at least a Cloud Application Administrator to complete the following steps.Step 1: Create the FMX Application in Azure AD Sign in to Azure AD. Navigate to Enterprise Applications. Select New Application located at the top of the page. Name the application (for example, “FMX”) and create it. Step 2: Configure SAML Single Sign-On Open the FMX application in Azure AD. Navigate to Single Sign-On. Select SAML as the sign-on method. Edit the Basic SAML Configuration and enter the following values: Identifier (Entity ID):https://hostname.gofmx.com/ Reply URL / Assertion Consumer Service (ACS):https://hostname.gofmx.com/login/saml2/callback Sign-on URL:Leave this field blank Replace hostname with your FMX tenant hostname. Leaving the sign-on URL blank helps prevent login issues.Save the configuration.Step 3: Configure User Attributes & ClaimsAdd the following claims under User Attributes & Claims per the Microsoft document:On the Attributes & Claims page, select Add new claim. Enter the Claim Name. Next to Source select Attribute. Then use the drop-down list to select the below corresponding attribute. Email Address ClaimClaim name: urn:oid:0.9.2342.19200300.100.1.3Source attribute: user.mail Display Name ClaimClaim name: urn:oid:2.16.840.1.113730.3.1.241Source attribute: user.displayname Phone Number Claim (Optional)Claim name: urn:oid:2.5.4.20Source attribute: user.telephonenumber Save your changes.Step 4: Assign Users to the Application Navigate to Users and Groups within the FMX application. Assign the users or security groups that should be allowed to log in using SSO. Only users assigned here will be able to authenticate. Unassigned users will receive an error.Step 5: Complete the Integration Locate the App Federation Metadata URL in the SAML Signing Certificate section of Azure AD. Send this metadata URL to your FMX Customer Success Manager. FMX Support will complete the final steps to enable SSO on your site.Optional: Azure AD Group Claims and MappingsOrganizations that wish to configure Azure AD claim rules and group mappings can reference the following support article. This configuration is optional and managed by each organization’s IT team. It does not affect the core functionality of Single Sign-On, but can be used to automate FMX user type assignments and building access. new-sample-groups-mapping.json (3 KB) Was this article helpful? 4 out of 14 found this helpful