Skip to content

SSO

SSO enables organizations to use their corporate identity provider to authenticate users. Currently supported SSO provides include:

  • Azure AD

To request support for additional SSO providers, please contact Seek support.

Azure Active Directory

Register Seek with Azure AD

Register an application in your Azure tenant using these instructions.

Seek's callback url to use for the Azure app's redirect URI is https://seek-prd.us.auth0.com/login/callback.

Configure Azure App Permissions

Configure permissions for the Azure app - see Microsoft's quickstart here.

  1. Use Delegated Permissions
  2. Seek requires the following permissions:
    • Group.Read.All
    • GroupMember.Read.All
    • User.Read
    • Directory.Read.All
    • Directory.AccessAsUser.All
    • email
    • offline_access
    • openid
    • profile

Communicate Setup to Seek

Provide the following information back to your Seek contact:

Azure Details

  • Microsoft Azure AD Domain
  • Azure App Client ID
  • Azure App Secret

IDP Group Mapping

  • Provide the group names that should be mapped to Seek roles: Admin, Engineer, Consumer
  • Multiple groups can map to the same role

Using IDP Groups for Permissions

If you have SSO enabled, you will be able to add groups from your IDP directly to a team in Insight Cloud. This will allow you to manage permissions in Insight Cloud based on your existing active directory group structure.

  1. Create a Team in Insight Cloud
  2. Add the Azure AD group to the Team
  3. Assign permissions to the Team
  4. When users who are a member of that AD group log in, they will have access to the permissions assigned to the Team

Read more about manging Teams in Insight Cloud here.