Single Sign-On (SSO) allows users to access multiple applications using a single set of login credentials. It enhances security and simplifies the authentication process. This guide will help you configure SSO for your TimeZest account using Microsoft Entra (formerly Azure AD).
There are three phases of setup:
Microsoft provisioning requests
At this time, Microsoft is not accepting new SSO or provisioning requests, which means TimeZest cannot be listed in the Microsoft Entra Gallery.
The instructions below will help you create a TimeZest SSO application, set up provisioning, and add TimeZest users to the application.
See more from Microsoft:
Creating the TimeZest SSO application in Entra
You will first create the TimeZest SSO application in Entra.
Step 1: Adding TimeZest SSO to the Microsoft Entra list of applications
In the Azure portal, go to Enterprise applications.
Click the New application button > Create your own application.
Step 2: Configure App Registration & Redirect URIs
Go to Home > App registrations > All applications.
Select TimeZest SSO.
In the sidebar, click Authentication.
Step 3: Set API Permissions
Click the API Permissions in the sidebar.
Click +Add a permission.
Click Microsoft Graph > Application permissions.
Search for and select
User.ReadBasic.All
.Select Add permissions.
Click the Grant admin consent for MSFT button.
Step 4: Set up SAML Single Sign-On
Navigate to Home > Enterprise applications
Click on the TimeZest SSO app.
Click Manage > Single sign-on link in the sidebar.
Select SAML as the single sign-on method.
Under Basic SAML Configuration section, click Edit.
Select the Add identifier button and provide the following values:
Enter
api://timezest
as Identifier (Entity ID) (you can use a different identifier if you prefer to).Copy the Entity ID onto Notepad for later use.
Enter
https://app.timezest.com/saml/microsoft
as Reply URL (Assertion Consumer Service URL).Leave the Index field blank.
Click Save.
Testing the integration
Do not test the SSO sign in configuration at this time. Additional setup is needed before users will be able to log in.
Step 5: Collect App Info to enter in TimeZest
There are three pieces of information you will capture in the SSO application to enter in TimeZest: Tenant ID, Application ID, and Entity ID. These steps will show you how to get to those items in Entra.
Application ID
Go to Home > Enterprise Applications > TimeZest SSO > Manage > Properties
Copy the Application ID onto Notepad for later use.
Tenant ID
Go to the Microsoft Entra ID > Overview page
Copy the Tenant ID onto the same Notepad along with Application ID for later use.
Entity ID
Go to Home > Enterprise Applications > TimeZest SSO > Manage > Single sign-on
Copy the Entity ID onto the same Notepad along with the Application ID and Tenant ID for later use.
Go back into the TimeZest app > Security & Permissions > Microsoft Entra ID > Connect
Enter the Tenant ID, Application ID, and Entity ID.
Select the Save Changes button.
Provisioning
Once the SSO application has been connected, you will now begin the provisioning process to map TimeZest users to the same users in Entra.
Step 6: Provisioning users from Microsoft 365 to TimeZest
Go to Home > Enterprise applications > TimeZest SSO > Provisioning > Overview (Preview).
Click Connect your application button.
Enter your Tenant URL
Enter the Secret Token
Click Test Connection.
If successful, click Create.
Resetting connection
The Tenant URL and Secret Token are only accessible when you initially set up the SSO integration or have removed the integration with TimeZest and attempting to reconnect.
Both fields can be found and copied in the Provisioning setup in the TimeZest app.
Step 7: Attribute Mapping
On the left menu, select Attribute Mapping (Preview).
Click Provision Microsoft Entra ID Groups:
Go back to Attribute Mapping (Preview) page and click Provision Microsoft Entra ID Users.
Click Edit for the userName attribute.
Change Source attribute to
mail
.Change Matching precedence to
2
.Click OK.
Click Edit for the externalId attribute.
Change Source attribute to
objectId
.Change Match objects using this attribute to
Yes
.Change Matching precedence to
1
.
Remove the mappings below by selecting the Delete button next to each:
title
emails[type eq "work"].value
preferredLanguage
name.givenName
name.familyName
name.formatted
addresses[type eq "work"].formatted
addresses[type eq "work"].streetAddress
addresses[type eq "work"].locality
addresses[type eq "work"].region
addresses[type eq "work"].postalCode
addresses[type eq "work"].country
phoneNumbers[type eq "work"].value
phoneNumbers[type eq "mobile"].value
phoneNumbers[type eq "fax"].value
Confirm the following mappings will remain:
userName
active
displayName
externalId
urn:ietf:params:scim:schemas:extension:enterprise:2.0:User:employeeNumber
urn:ietf:params:scim:schemas:extension:enterprise:2.0:User:department
urn:ietf:params:scim:schemas:extension:enterprise:2.0:User:manager
Click Save button.
Return to Attribute Mapping (Preview) page and click on the Provisioning link on the left sidebar.
Provisioning is now configured, and any time a user is added or removed from the “TimeZest SSO” application, that change will be reflected in TimeZest.
Adding TimeZest users to the TimeZest SSO application
The final step is adding the TimeZest users to the TimeZest SSO application so they can log in to the TimeZest app without having to enter their password.
Step 8: Managing TimeZest users in Microsoft 365
Go to Home > Enterprise applications > TimeZest SSO > Manage > Users & Groups.
Click the +Add user/group button.
The setup is now complete. Your users will now be able to access the TimeZest app and enter their email address to log in.
Auto sync and active
When users are added to the TimeZest SSO application but their TimeZest profile is not yet created, the provisioning process will automatically create the user in TimeZest and set them as Active. To verify, go to TimeZest > Users. You can disable the blue toggle the same day the user is created to avoid being charged a license.