SSO: Setting up Azure with WorkTango

  • Updated

To begin, the SSO point of contact for the company will need to follow all instructions here:

Microsoft Azure Active Directory SaaS WorkTango tutorial

If setting up in the sandbox environment, follow the steps as listed. If setting up in the production environment, when at the “Create an Azure AD test user” step, the tutorial suggests a test user but it is best to test with an actual user who already has a login within Azure and the WorkTango platform*. If there are any issues with this process, please speak to your Customer Success point of contact.

After all of those steps have been followed, we need the Federation Metadata URL. Once the tutorial has been completed and your AM or CS rep has the metadata information, we can set up the WorkTango side to properly work with Azure SSO. As soon as that setup is complete, a login attempt can be made to test.

This SSO integration refers to a name WorkTango was previously known as (YouEarnedIt) for the app name.

Important notes:

Ensure, under YouEarnedIt app properties, that “Enabled for user to sign-in?” is set to yes 

azure sso 1.png
 
 
Within the Single Sign-On settings page, make sure that the Identifier (entity id) does NOT include “https://” prior to the url listed. In the example below, the subdomain is Test: 
azure sso 2.png
 
Add the Assertion Consumer Service URL: 
azure sso 3.png
 
 
If mobile app will be used, Active Directory instance will require configuration changes that allow out of network access.
 

*The documentation provided above is only applicable to the WorkTango Recognition & Rewards platform and does not apply to our Surveys & Insights solution.

Related to

Was this article helpful?

0 out of 0 found this helpful

Have more questions? Submit a request

Comments

0 comments

Article is closed for comments.