Platform Administrator can access Phriendly Phishing via Single Sign-on (SSO). Enabling this features, allows platform admins to log into Phriendly Phishing using their Network or work credentials.
Single Sign-On (SSO) can be enabled and configured via.
- Microsoft Entra ID
- Okta AD
- Active Directory
Configure Admin SSO via Microsoft Entra ID
- Create an Enterprise Application in Azure. Skip to step 2 if an App has already been created for Platform Admins.
- In the Overview page of the Enterprise Application Select Single Sign-on > SAML.
- Under Basic SAML Configuration, click the edit or the pencil icon
-
Select Add Identifier and Add Reply URL and enter below details and click Save.
Details to Add:
- Identifier: PH2System
- Reply URL: https://launch.phriendlyphishing.com/company_admin/saml/acs
- Under SAML Certificates, download Certificate (Base64).
-
Open the downloaded .cert file in notepad,
a. Copy the text and go to https://www.samltool.com/fingerprint.php.
b. Paste the copied text on X.509 Cert field
c. Select Algorithm "sha256" and click Calculate fingerprint.
- In Section 4 - Set up, take note of the Login URL and Logout URL to use later in the next steps.
- Go back to your Phriendly Phishing account, have the Formatted Fingerprint, Log in URL and Logout URL ready (obtained from previous steps) and input per below screenshot
-
and Enable SSO Settings
- Log out from the platform and log in again using your Microsoft Credentials.
Comments
0 comments
Please sign in to leave a comment.