SSO with Microsoft

Parmonic supports SSO using OIDC.

When a user first logs into Parmonic using Microsoft SSO, a Parmonic "enterprise application" will automatically appear in your org's directory.

Setting up Microsoft SSO

*Prerequisites: The IT admin must be added to the Parmonic account as a user

Microsoft SSO does not require additional configuration in most cases.

However, if your organization does not allow users to consent to low-impact apps, your IT team will need to add Parmonic using the following steps:

Step 1. Log into Parmonic at go.parmonic.com with your admin email

Step 2. Click Accept 

microsoft-sso-consent-1c55241b18f6484288509da6cdbbe5d5.png

Step 3. Go to the AAD Portal

Step 4. Go to Enterprise Applications. Parmonic should appear in a few minutes. You may control who has access to Parmonic from here. For more information see Manage access to an application. 

microsoft-sso-enterprise-applications-f484c9b09d24ff13ce4e94c77437ac79.png

Data accessed from the Active Directory

Parmonic requests 3 scopes for OIDC login: openid, email, profile.
For more information on these, see Scopes and permissions in the Microsoft identity platform.

On the first login, each user will be prompted to consent to share data by clicking on an Accept button.

As an admin, you may consent on behalf of the org:

  1. Enterprise Applications  Parmonic  Permissions.
  2. Click on the Grant admin consent for Parmonic button.
  3. Click Accept.

microsoft-sso-grant-admin-consent-beb8c1fd0ea41cdf914bdd43140a8097.png

Did this answer your question? Thanks for the feedback There was a problem submitting your feedback. Please try again later.

Still need help? Contact Us Contact Us