Objective
The purpose of this article is to provide guidance in setting up Single Sign On with Azure for Outreach.
In order to setup Azure with Outreach, the following are required:
- Admin privileges in Outreach.
- Admin privileges in Azure.
- During this procedure, you will have to navigate between the Azure and Outreach applications several times. It is recommended to have each open in separate browser tabs for convenience.
Applies To
- Outreach Admins
- Azure Admins
- SSO
Procedure
Setting up Azure
- As a Azure admin, go to https://portal.azure.com.
- Within Azure Service, select Enterprise Applications. Alternatively, you can search for Enterprise applications within the search bar.
- Click New application.
- Select Create your own application.
- Input a name such as Outreach_SSO.
- Select Integrate any other application you don't find in the gallery (Non-gallery).
- Click Create.
- Once a application is created, you should be directed to the application's page. Select Single sign-On > SAML.
- Within the Basic SAML Configuration, click Edit. Input the below placeholder values and select Save.
- For Identifier (Entity ID): _placeholder_
- You will update this later.
- Reply URL (Assertion Consumer Service URL): https://placeholder.com
- You will update this later.
- For Identifier (Entity ID): _placeholder_
- Within the Attributes & Claims, select Edit. Click on Unique User Identifier Name (Name ID) and ensure it's formatted as below. If not, then modify and select "Save" under Manage Claim.
- Name identifier format: Email address
- Source: Attribute
- Source Attribute: user.userprincipalname
- Within 3. SAML Certificates Download and save the Certificate (Base64) to your computer. You will need to upload this within Outreach settings later.
- Within 4. Set up Outreach_SSO
- Login URL
- Copy this into a Google Doc or notepad so you may paste this into Outreach settings later.
- Microsoft Entra Identifier/Azure AD Identifier
- Copy this into a Google Doc or notepad so you may paste this into Outreach settings later.
- Login URL
Setting up Outreach
- Log in to Outreach.
- Click Administration > Organization > Org info.
- Navigate to Sign-in and password options.
- Click Edit.
- Click Add Identity Provider.
- Add the requested identity information that was retrieved from Azure.
- Name: This can be Azure_SSO.
- Sign In URL: This is the Login URL from Step 12.
- Issuer (Identity Provider Entity ID): This is the Microsoft Entra Identifier/Azure AD Identifier from Step 12.
-
Certificate: This is the certificate (Base64) you downloaded from Step 11.
- Choose File and select the downloaded file.
- Note: The above screenshot contains two advanced settings: "Use NameId Instead of Email" and "Enable just-in-time new user provision". We do NOT recommend checking these options unless the functions of each are understood and needed by your organization. You can read more on these advanced settings in Advanced Settings For Identity Provider (SSO).
- You should be redirected back to SSO Settings. Click Edit.
- Now find the Setup Info section. There are two important fields you will need to copy later in Step 3 (ideally you should have this tab open as you go through to Step 3).
- Assertion Consumer Service (ACS) URL
- Copy this into a Google Doc or notepad so you may paste this into Outreach settings later.
- Service Provider Entity ID / Audience URI
- Copy this into a Google Doc or notepad so you may paste this into Outreach settings later.
- Copy this into a Google Doc or notepad so you may paste this into Outreach settings later.
- Assertion Consumer Service (ACS) URL
Update Azure Application
- Go back to the newly created application's settings. If you don't have the application already open in Azure, you can search within Enterprise Applications and select it.
- Navigate to Single sign-on again and then select edit on 1. Basic SAML Configuration. Replace placeholder values.
- For Identifier (Entity ID): This will be the Assertion Consumer Service (ACS) URL retrieved from Step 5.
- Depending on your organization's security Azure policies, you will likely need to assign users and groups to the application. Select Users and groups and assign users and groups that utilize Outreach. If you are the Outreach Admin who is setting the SSO up, you will need to assign yourself to test out the connection in Step 4.
Enable SSO inside Outreach Settings
- Return to Outreach's SSO settings.
- Select Single Sign On > Edit. Here, double check all your settings are properly configured. Please confirm the below values are matching respectively in Outreach:
- Sign In URL: Matches the values from Azure.
-
Issuer (Identity Provider Entity ID): Matches the values from from Azure.
- Certificate: Confirm it is the same downloaded certificate from Azure.
- Assertion Consumer Service (ACS) URL: Pasted and saved within Azure settings
-
Service Provider Entity ID / Audience URI: Pasted and saved within Azure settings
- Once you have confirmed all values are matching, then go back within Outreach's SSO Settings, and select Enable.
-
Important Note: It is required to enable to test out the setup.
- Your users will not be instantly signed out.
- You should have already assigned yourself to the application
- You should receive {"success":true}
- In the event of a the failure of go back to this page to uncheck enable.
-
Important Note: It is required to enable to test out the setup.
- Select Test and a new tab should popup with {"success":true}. This indicates the SSO connection works and the setup was successful.
Congrats! SSO is now enabled!