Single Sign-On (SSO) is an authentication method that allows users to log in with a single user name and password to several systems. Single Sign-On support for VBC allows you to use a single username and password across other single sign-on enabled apps and VBC. Once an account is configured for SSO, users log in using the Log in with Single Sign-On button on the Vonage account login page.
Azure Active Directory (Azure AD) is Microsoft's cloud-based identity and access management service, which helps your employees sign in and access resources. Azure Active Directory enables single sign-on access to cloud applications (like Vonage Business Communications).
Once a user signs into Azure Active Directory, they can then launch any of their enabled web apps without re-entering their login credentials for each app. Azure Active Directory establishes a secure connection with the user’s browser. It then authenticates the user to login to Azure Active Directory managed apps via SAML, a pre-integrated, federated authentication protocol. The following is required for Azure SSO:
To edit the basic SAML configuration options:
VBC Setting | Azure AD Setting |
Entity ID | Identifier (Entity ID) Replace existing value. |
Sign-in URL (Default) | Reply URL (Default) |
Sign-in URL (Secondary) | Reply URL (Secondary) |
Sign-out URL | Logout URL |
Azure AD Setting | Value |
Relay State | 0 |
The Set up <applicationName> section lists the values that need to be configured so that Vonage Business Cloud uses Azure AD as a SAML identity provider.
Azure AD Setting | VBC Setting |
Login URL | Sign-in page URL |
Azure AD Identifier | Entity ID |
Logout URL | Sign-out page URL |
This step is only required for advanced configurations. When a user authenticates to the application, Azure AD issues the application a SAML token with information (or claims) about the user that uniquely identifies them. By default, this information includes the user's username, email address, first name, and last name. You might need to customize these claims if, for example, the application requires specific claim values or a Name format other than username.
If User assignment required was selected when creating your enterprise application, you must add users to your application so they can sign in.
Now that you have configured Vonage Business Communications to use Azure AD, your end users are ready to use Single Sign-on.
You can start using Single Sign-on from any Vonage Business Communications login page. Get started by clicking Login with Single Sign-on on the login page.
Google Workspace Setting | Vonage Setting |
SSO URL | Sign-in Url |
Entity ID | Entity ID |
n/a | Sign-out Url |
Vonage Setting | Google Workspace Setting |
Entity ID | Entity ID |
Sign in URL (default) | ACS URL |
Sign in URL (secondary) | Start URL |
Okta is a cloud-based identity and access management service that helps your employees sign in and access resources. Okta enables single sign-on access to cloud applications (like Vonage Business Communications).
Once a user signs into Okta, they can then launch any of their enabled web apps without re-entering their login credentials for each app. Okta establishes a secure connection with the user’s browser and then authenticates the user to login to Okta managed apps via SAML, a pre-integrated, federated authentication protocol. The following is required for Okta SSO:
These steps apply for existing customers only, new customers go through this process before going live with with their Vonage account.
Okta | Vonage |
Entity ID | Entity ID |
Sign-in URL | Sign-in URL |
Sign-out URL | Sign-Out URL |
See OneLogin Single Sign-on (SSO) for Vonage Business Communications for setup instructions.
If Issue Is... | Then... |
(All IDPs) User logs in and gets an error: Authentication Error: We are experiencing technical difficulties: please try again later. Impacts all users on the account. | Verify the settings are entered into IDP and Vonage according to the instructions for your specific IDP. This requires comparing the values in IDP and Vonage. Vonage does not have access to your IDP portal. NOTES:
|
(All IDPs) User logs in and gets an error: Authentication Error: We are experiencing technical difficulties: please try again later. Impacts one specific user on the account. | Verify the username is a match in IDP and VBC. |
(All IDPs) User logs in and gets an error: This username may be incorrect. Make sure you typed it correctly. Otherwise, contact your admin. | Verify the username is a match in IDP and VBC. |
(Azure only) User logs in and gets an error: SAML authentication request's RequestedAuthenticationContext Comparison value must be 'exact'. Received value: 'Minimum' | The error is related to a custom configuration setting from Azure. To resolve this issue, contact Vonage Support. |
If these steps do not correct the issue, or if the issue is not detailed here, Contact Us to escalate the issue. Recommended template:
Modify Azure User Names |
|
Modify Okta User Names | In the Okta portal:
|