Tutorial: Azure Active Directory integration with Hightail
In this tutorial, you learn how to integrate Hightail with Azure Active Directory (Azure AD).
Integrating Hightail with Azure AD provides you with the following benefits:
- You can control in Azure AD who has access to Hightail
- You can enable your users to automatically get signed-on to Hightail (Single Sign-On) with their Azure AD accounts
- You can manage your accounts in one central location - the Azure portal
If you want to know more details about SaaS app integration with Azure AD, see what is application access and single sign-on with Azure Active Directory.
To configure Azure AD integration with Hightail, you need the following items:
- An Azure AD subscription
- A Hightail single sign-on enabled subscription
To test the steps in this tutorial, we do not recommend using a production environment.
To test the steps in this tutorial, you should follow these recommendations:
- Do not use your production environment, unless it is necessary.
- If you don't have an Azure AD trial environment, you can get a one-month trial here.
In this tutorial, you test Azure AD single sign-on in a test environment. The scenario outlined in this tutorial consists of two main building blocks:
- Adding Hightail from the gallery
- Configuring and testing Azure AD single sign-on
Adding Hightail from the gallery
To configure the integration of Hightail into Azure AD, you need to add Hightail from the gallery to your list of managed SaaS apps.
To add Hightail from the gallery, perform the following steps:
In the Azure portal, on the left navigation panel, click Azure Active Directory icon.
Navigate to Enterprise applications. Then go to All applications.
To add new application, click New application button on the top of dialog.
In the search box, type Hightail.
In the results panel, select Hightail, and then click Add button to add the application.
Configuring and testing Azure AD single sign-on
In this section, you configure and test Azure AD single sign-on with Hightail based on a test user called "Britta Simon".
For single sign-on to work, Azure AD needs to know what the counterpart user in Hightail is to a user in Azure AD. In other words, a link relationship between an Azure AD user and the related user in Hightail needs to be established.
In Hightail, assign the value of the user name in Azure AD as the value of the Username to establish the link relationship.
To configure and test Azure AD single sign-on with Hightail, you need to complete the following building blocks:
- Configuring Azure AD Single Sign-On - to enable your users to use this feature.
- Creating an Azure AD test user - to test Azure AD single sign-on with Britta Simon.
- Creating a Hightail test user - to have a counterpart of Britta Simon in Hightail that is linked to the Azure AD representation of user.
- Assigning the Azure AD test user - to enable Britta Simon to use Azure AD single sign-on.
- Testing Single Sign-On - to verify whether the configuration works.
Configuring Azure AD single sign-on
In this section, you enable Azure AD single sign-on in the Azure portal and configure single sign-on in your Hightail application.
To configure Azure AD single sign-on with Hightail, perform the following steps:
In the Azure portal, on the Hightail application integration page, click Single sign-on.
On the Single sign-on dialog, select Mode as SAML-based Sign-on to enable single sign-on.
On the Hightail Domain and URLs section, perform the following steps if you wish to configure the application in IDP initiated mode:
In the Reply URL textbox, type the URL as:
The Reply URL value is not real value. You will update the Reply URL value with the actual Reply URL, which is explained later in the tutorial.
Check Show advanced URL settings and perform the following step if you wish to configure the application in SP initiated mode:
In the Sign On URL textbox, type the URL as:
On the SAML Signing Certificate section, click Certificate (Base64) and then save the certificate file on your computer.
Hightail application expects the SAML assertions in a specific format. Please configure the following claims for this application. You can manage the values of these attributes from the "Attribute" tab of the application. The following screenshot shows an example for this.
In the User Attributes section on the Single sign-on dialog, configure SAML token attribute as shown in the image and perform the following steps:
Attribute Name Attribute Value FirstName user.givenname LastName user.surname user.mail UserIdentity user.mail
a. Click Add attribute to open the Add Attribute dialog.
b. In the Name textbox, type the attribute name shown for that row.
c. From the Value list, type the attribute value shown for that row.
d. Leave the Namespace blank.
e. Click Ok.
Click Save button.
On the Hightail Configuration section, click Configure Hightail to open Configure sign-on window. Copy the SAML Single Sign-On Service URL from the Quick Reference section.
Before configuring the Single Sign On at Hightail app, please white list your email domain with Hightail team so that all the users who are using this domain can use Single Sign On functionality.
In another browser window, open the Hightail admin portal.
Click on User icon from the top right corner of the page.
Click View Admin Console tab.
In the menu on the top, click the SAML tab and perform the following steps:
a. In the Login URL textbox, paste the value of SAML Single Sign-On Service URL copied from Azure portal.
b. Open your base-64 encoded certificate in notepad downloaded from Azure portal, copy the content of it into your clipboard, and then paste it to the SAML Certificate textbox.
c. Click COPY to copy the SAML consumer URL for your instance and paste it in Reply URL textbox in Hightail Domain and URLs section on Azure portal.
d. Click Save Configurations.
Creating an Azure AD test user
The objective of this section is to create a test user in the Azure portal called Britta Simon.
To create a test user in Azure AD, perform the following steps:
In the Azure portal, on the left navigation pane, click Azure Active Directory icon.
To display the list of users, go to Users and groups and click All users.
To open the User dialog, click Add on the top of the dialog.
On the User dialog page, perform the following steps:
a. In the Name textbox, type BrittaSimon.
b. In the User name textbox, type the email address of BrittaSimon.
c. Select Show Password and write down the value of the Password.
d. Click Create.
Creating a Hightail test user
The objective of this section is to create a user called Britta Simon in Hightail.
There is no action item for you in this section. Hightail supports just-in-time user provisioning based on the custom claims. If you have configured the custom claims as shown in the section Configuring Azure AD Single Sign-On above, a user is automatically created in the application it doesn't exist yet.
If you need to create a user manually, you need to contact the Hightail support team.
Assigning the Azure AD test user
In this section, you enable Britta Simon to use Azure single sign-on by granting access to Hightail.
To assign Britta Simon to Hightail, perform the following steps:
In the Azure portal, open the applications view, and then navigate to the directory view and go to Enterprise applications then click All applications.
In the applications list, select Hightail.
In the menu on the left, click Users and groups.
Click Add button. Then select Users and groups on Add Assignment dialog.
On Users and groups dialog, select Britta Simon in the Users list.
Click Select button on Users and groups dialog.
Click Assign button on Add Assignment dialog.
Testing single sign-on
The objective of this section is to test your Azure AD single sign-on configuration using the Access Panel.
When you click the Hightail tile in the Access Panel, you should get automatically signed-on to your Hightail application.