After they log in there as well, their Tresorit password will no longer be valid, and they’ll only be able to sign in through the SSO option. They will have to confirm their current password before being redirected to the company login page. Using SSO in Tresorit Activationįor existing users in the policy group, a migration dialog will appear in the Tresorit applications. Your users will have to use 2-Step Verification via their configured method in their Google profile. The 2-Step Verification policy will be turned off for this group, as in case of SSO, this feature is handled by Google. Don’t forget to Save the changes to your policy. Set the Single Sign-On policy to Enabled, so the users with that policy will have to use the configured Google server for signing in. Under the Policies tab, you can either create a new policy or edit an existing one. If you’re successful, a gentle notification should appear. You might need to enter your password again if your session has expired. Once you accepted the Terms, select Google Workspace and paste in the previously acquired ID. Then click Enable SSO under the Single Sign-On section.Ī window will come up, prompting you to accept Tresorit's SSO specific Terms. On the Settings tab, make sure that Advanced Control is enabled. Setting up SSO in Tresorit’s Admin Center Step 1. The Application type of this new credential should be Web application.Įnter a Name for your app (such as Tresorit).Īdd the following as URI for Authorised Javascript origins:Īdd the following Authorised redirect URIs: Now you can click SAVE AND CONTINUE to view the Summary.Īfter that you can click on BACK TO DASHBOARD.Ĭreate credentials in Google Cloud PlatformĪs a next step you need to create a new credential in the previously created project.Ĭhoose Credentials under the APIs and Services click on CREATE CREDENTIALS and choose OAuth client ID. On the Scopes page you should click on ADD OR REMOVE SCOPES and add these URLs to the field under MANUALLY ADD SCOPES As User support email you should add an address where your users can reach your IT Admin Team in case they have any questions or technical difficulties.Īs Developer contact information you should add an address where Google can notify you about any changes to your project.Īfter that you can click SAVE AND CONTINUE. You need to set up the OAuth consent screen otherwise you won’t be allowed to create credentials in this project.Ĭhoose OAuth consent screen under APIs and Services and select Internal as User Type then click CREATE.Īs an App name we recommend to use Tresorit. To perform that choose Library under the APIs and services and search for Google Drive and click on Google Drive. The next step is to enable Google Drive API in your project. ![]() Here you can find the official 5-step tutorial for this: Įnable Google Drive access to this client How to setup SSO for Tresorit Create a New Google Cloud projectĪs a first step you need to create a Google Cloud project in Google Cloud Console. Please note that If you're using SSO, Internet Explorer 11 and all versions of Microsoft Edge until 44.19041 are not supported. This folder is only accessible by the given application and its contents are hidden from the user and from other Drive apps. ![]() We used the built-in capability of the API to store application-specific data in a special folder. We implemented our support for Google SSO with the help of the Google Drive API. Once you have the IDs, you can set up the policy groups and users and enable SSO policy for them, as a last step. You also have to enable Google Drive API. During this configuration, you will acquire an ID that you’ll have to set in Tresorit’s Admin Center. You’ll have to create and configure a new OAuth Client on the Google Cloud Platform Admin UI under APIs and services. ![]() This documentation will guide you through setting up Tresorit SSO with Google.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |