Dotcom-Monitor supports SSO (Single Sign On) login using SAML 2.0. SAML provides the transfer of authentication data between the clients’ Identity Provider and Dotcom-Monitor service. All user login information is stored on the Identity Provider side and not by Dotcom-Monitor which guarantees a high level of security and a better user experience.
Once you have set up the permission groups in your system, Dotcom-Monitor maps these groups to our user roles and grants access to the Dotcom-Monitor system accordingly.
Further in this article, we provide the steps required to enable SSO with Active Directory FS (ADFS) and AZURE Active Directory (Azure AD) as the Identity Providers. Also, step-by-step guides for OKTA SAML integration are provided.
-
SSO with Active Directory FS
-
SSO with AZURE
-
SSO with OKTA
Configuring SSO for Departments
If you have a Department created for the Dotcom-Monitor account, you can configure SSO users to log in to it.
To enable SSO for Departments, add the department name as a suffix to the name of the group or role reserved for Dotcom-Monitor purposes in AD. Use a double hyphen as a separator:
<AD Group Name>--<Department Name>
To set up SSO with Dotcom-Monitor, please use the following names to configure SSO roles in your directory service:
AD Group Name (SSO Role) | User Role in Dotcom-Monitor |
Dotcom-Monitor_Administrators | Admin |
Dotcom-Monitor_Users | User |
Dotcom-Monitor_Accounting_Users | Accounting |
Dotcom-Monitor_ReadOnly_Users | Viewer |
Dotcom-Monitor_Power_Users | Power User |
Dotcom-Monitor_Operators | Operator |
For example, to allow a user to log in to the “AlphaDep” department with permissions of the Power User role, add the following suffix to the Dotcom-Monitor_Power_Users AD Group:
«Dotcom-Monitor_Power_Users--AlphaDep»
You can also add several departments’ names one by one using the same format. For example:
«Dotcom-Monitor_Accounting_Users--AlphaDep--BetaDep--Department3»
To allow users to log in to the root account, specify a relevant AD Group without a department suffix as was described above:
«Dotcom-Monitor_ReadOnly_Users»
If a user is included in several «Dotcom-Monitor_» AD Groups with configured SSO for Departments, logging in to all corresponding Departments will be enabled (if the Departments exist in the Dotcom-Monitor account).
See also: Signing in with SSO