SSO (Single Sign-On)

Microsoft

Microsoft SSO enables you to access Parloa using your Microsoft account credentials, eliminating the need for a separate Parloa account.

Requirements for Microsoft SSO

To utilize Microsoft SSO with Parloa, ensure you have:

  • An active Microsoft account within Azure Active Directory.

  • Confirm with your organization’s Azure administrator if SSO for Parloa is enabled as per your organization's Azure settings.

Setting Up Microsoft SSO

Initial Sign-Up Process

  1. Select Microsoft SSO during the initial sign-up.

  2. Create a password for your Parloa account, providing an alternative login method.

Enforcing SSO

Parloa enables disabling password-based logins, a recommended step for administrator roles to enhance account security.

Securing Microsoft Accounts

To maximize your account's security:

Multi-Factor Authentication

Microsoft accounts support Multi-Factor Authentication (MFA), also known as Two-Factor Authentication (2FA). Implementing MFA in conjunction with SSO provides an additional security layer.


IDP Authentication via OpenID Connect

IDP (Identity Provider) authentication in Parloa uses OpenID Connect, ensuring secure access for authorized personnel.

IDP Authentication Process

  1. Enter your email and click Sign In.

After successfully signing in through your IdP, you will be redirected to the Parloa App.

Enabling IDP Authentication

To enable IDP authentication using OpenID Connect (OIDC) with Parloa, please follow these steps:

1 – Start by gathering the following information from your identity provider
  • Discovery Endpoint – URL of your OpenID Connect provider's discovery document.

  • Client ID – Your unique public identifier.

  • Client Secret – Required if your IdP doesn’t support the implicit grant type.

  • Email domains and Subdomains – The email domains and subdomains that require access to the SSO.

2 – Configure Your OIDC Account for Parloa
  • Redirect URI/Callback URI – Ensure that your OIDC account is configured to whitelist the following Redirect URI/Callback URI: https://app.parloa.com/api/v1/auth/oidc/callback. This URI is where the authentication response is sent and is essential for successful integration.

  • Support for Code Grant Flow – Your OIDC account must support the code grant flow. This is a secure authorization method that exchanges an authorization code for an access token and is crucial for the authentication process.

3 – Contact Parloa for Integration

Once you have gathered the required information and configured your OIDC account, email the details to Parloa at support@parloa.com or reach out to your Customer Success Manager (CSM) for further assistance in setting up IDP authentication with your Parloa account.

Last updated