Enable Outlook Single Sign-on (SSO) authentication for users
miniOrange Outlook SSO (Single Sign-on) product provides ready integrations and a seamless SSO experience to Outlook, Office 365, Sharepoint, other microsoft apps, and all other web and SaaS applications for all your users. Single Sign-On (SSO) for Microsoft Outlook provides you secure auto-login to your apps. It allows enterprises to quickly increase security of information and resources without worrying about time for initial set up or future upgrades.
Microsoft Outlook Single Sign-on (SSO) solution by miniOrange identity platform provides an option to integrate with multiple third-party Identity Providers which supports standard protocols like SAML, OAuth, etc. IDP here means (Okta, Auth0, Ping, Onelogin, etc) or Active Directory (AD) where your existing users are managed. Once your Outlook Single sign-on (SSO) is enabled with your IDP / Directory successfully, your employees or end users will be able to authenticate and login into their Outlook account and other integrated applications with the use of existing username password. They won't need to create or manage credentials differently to operate Outlook account or any other app account. Given below is the setup guide to configure SAML SSO for your Outlook.
miniOrange identity platform and Microsoft Outlook Single Sign-On (SSO) integration to authenticate users supports the following features:
SP (Service Provider) Initiated SAML Single Sign-On (SSO)
In this flow, the user tries to access to the Serivce Provider (Outlook) organization directly. The request is redirected to the third-party Identity Provider by miniOrange Identity platform for authenitcation. On sucessfull authentication from the third-party Identity provider, the user is given access to the application (service provider).
IdP (Identity Provider) Initiated SAML Single Sign-On (SSO)
In this flow, the user logs in or access to the miniOrange Identity platform using his credentials. Now the user can access any of the organization's configured Service Providers (Outlook, other Microsoft apps, etc.) through the Identity Provider admin console without having to enter the credentials agian.
Connect with External Source of Users
miniOrange provides user authentication from various external sources, which can be Directories (like ADFS, Microsoft Active Directory, OpenLDAP, AWS etc), Identity Providers (like Microsoft Entra ID, Okta, AWS), and many more. You can configure your existing directory/user store or add users in miniOrange.
Video Setup Guide
Prerequisites
1. Sync On-Premise Active Directory with Microsoft Entra ID
NOTE: If you want to use your On-Premise Active Directory as a user store to Single Sign-On into Microsoft Outlook then follow the below steps to sync your AD and Microsoft Entra ID.
In Choose Application Type click on Create App button in SAML/WS-FED application type.
In the next step, search for Office 365. Click on Office 365 app.
Make sure the SP Entity ID or Issuer is: urn:federation:MicrosoftOnline
Make sure the ACS URL is: https://login.microsoftonline.com/login.srf
Click on Next.
Configure Name ID based on the User Store you are using:
Using Active Directory / miniOrange brokering service: Select External IDP Attribute from the dropdown and add objectguid in the text-box that appears.
Using miniOrange as a User Store: Select Custom Profile Attribute and select a Custom Attribute from the drop-down.
Set the login policy. You can choose to enable 2FA for login or have users login using a standard username-password.
Click on Save to configure Office 365.
2. Configure Microsoft Graph Services
Click on the icon ' ' and choose Metadata.
Click on the Download Federate Domain Script button under "INFORMATION REQUIRED TO AUTHENTICATE VIA EXTERNAL IDPS"
Enter the domain name that you want to federate and click on Download.
Note: You cannot federate your default "onmicrosoft.com" domain. To federate your Microsoft Outlook tenant, you must add a custom domain to Microsoft Outlook.
After downloading the script, Open PowerShell run the federate_domain script using: cd ./Downloads
powershell -ExecutionPolicy ByPass -File federate_domain.ps1
Your domain is now federated. Use the commands below to check your federation settings: Get-MgDomain -DomainId "<domain>" | Select-Object Id, AuthenticationType
4. Test Outlook SSO Configuration
1. Using SP initiated login :-
Go to Office 365 - Microsoft Outlook Login and click on sign-in
You will be redirected to Microsoft Graph portal. Here you have to enter the UPN of the user.(It should contain the domain that is federated with miniOrange)
Now you will be redirected to miniOrange IdP Sign On Page.
Enter your login credential and click on Login. You will be automatically logged in to your Microsoft Outlook account.
2. Using IdP initiated login :-
Login to your miniOrange Self Service Console as an End User and click on the Outlook (Office 365) icon on your Dashboard.
Once you click on Outlook or Office 365 you don't need to enter credentials again you will be redirected to Outlook or Office 365 account.