You can configure single sign-on (SSO) for your KCM GRC platform with Azure Active Directory (AD). When you enable SSO, your KCM GRC users can log in to the platform without creating a password.
You must be an account administrator in both KCM GRC and Azure AD to configure SSO. You also must have a Premium Azure AD subscription to configure SSO for KCM GRC.
Follow the steps in the sections below to configure SSO for KCM GRC with Azure AD.
Add the KCM GRC Platform to Azure AD
Before configuring SSO in your KCM GRC platform, please connect KCM GRC to your Azure AD account by following the instructions below.
First, add the KCM GRC application to your Azure AD account.
- Log in to the Azure AD portal.
- Navigate to the All applications tab from the navigation panel (Enterprise applications > All applications).
- Click the + New application button.
- Click the Create your own application button.
- Enter "KCM GRC" into the What's the name of your app? field.
Tip:To add the KCM GRC logo to your Azure AD application, download the KCM GRC logo to your device. Then, navigate to the Properties tab in Azure AD, click the Select a file button, and upload the logo.
- Select the Integrate any other application you don't find in the gallery option.
- Click the Create button.
Next, obtain your KCM GRC SSO information, which you will need to configure SSO in Azure AD.
- Open your KCM GRC platform in a new window or tab.
- In the top-right corner of the screen, navigate to Settings > Account Settings.
- Click the SSO Settings tab on the View Account page.
- Locate the SSO Information section. In steps 16-20, you can copy and paste the SSO Information URLs into Azure AD.
Finally, configure SSO in Azure AD.
- Return to the Azure AD portal.
- Select the Single sign-on tab from the navigation panel.
- Select SAML.
- In the Basic SAML Configuration section, click the pencil icon to edit the SAML settings.
Note:For steps 16-20, you can return to step 11 to copy the SSO Information URLs and paste them into the Basic SAML Configuration box.
- Paste your KCM GRC Entity ID into the Identifier (Entity ID) field. Please see below for an example of an Entity ID.
- If your account is on the US server: https://organization.kb4compliance.com/metadata
- If your account is on the UK server: https://organization.uk.kcmgrc.com/metadata
- Paste your KCM GRC Callback URL into the Reply URL field. Please see below for an example of a Callback URL.
- If your account is on the US server: https://organization.kb4compliance.com/saml/acs
- If your account is on the UK server: https://organization.uk.kcmgrc.com/saml/acs
- Paste your KCM GRC Sign in URL into the Sign On URL field. Please see below for an example of a Sign in URL.
- If your account is on the US server: https://organization.kb4compliance.com/saml/login
- If your account is on the UK server: https://organization.uk.kcmgrc.com/saml/login
- (Optional) Enter your KCM GRC Relay State into the Relay State field. Please see below for an example of a Relay State.
Note:The Relay State is only necessary if you are using MFA for Azure AD.
- If your account is on the US server: https://organization.kb4compliance.com
- If your account is on the UK server: https://organization.uk.kcmgrc.com
- (Optional) Paste your KCM GRC Sign out URL into the Logout URL field. Please see below for an example of a Sign out URL.
Note:The Sign out URL is only necessary if you want to redirect your users to the KCM GRC login screen after they log out of your platform.
- If your account is on the US server: https://organization.kb4compliance.com/logout
- If your account is on the UK server: https://organization.uk.kcmgrc.com/logout
- Click the Save button.
- In the User Attributes & Claims section, click the pencil icon to edit the attributes.
- Delete the attributes that are listed below:
- Givenname
- Surname
- Emailaddress
- Name
- Click the pencil icon next to the Unique User Identifier attribute.
- In the Source attribute field, replace user.userprincipalname with user.mail.
- Click the Save button.
- In the SAML Signing Certificate section, copy the App Federation Metadata Url by clicking the Copy button.
Assign Users to KCM GRC in Azure AD
After you add the KCM GRC application to Azure AD, please follow the instructions below to assign users to KCM GRC in Azure AD.
- Create any new users in your KCM GRC platform. Please see our Working with Users article for more information.
- Log in to the Azure AD portal.
- Navigate to the All applications tab from the navigation panel (Enterprise applications > All applications).
- Select the KCM GRC application.
- Select Users and groups tab from the navigation menu.
- Click the + Add user button.
- Select Users and groups in the Add Assignment column.
- Select the users or groups that have accounts in your KCM GRC platform.
- Click the Select button.
- Click the Assign button.
Configure Azure AD SSO in KCM GRC
After you assign users to the KCM GRC application from Azure AD, please follow the instructions below to configure SSO in KCM GRC.
- Log in to your KCM GRC account.
- In the top-right corner of the screen, navigate to Settings > Account Settings.
- Click the SSO Settings tab on the View Account page.
- Click the SSO Enabled toggle to enable SSO.
- Paste the App Federation Metadata Url that you copied in step 27 of the Add the KCM GRC Platform to Azure AD section into the Remote Metadata XML field.
- Click the Import button.
- Wait for the file to import successfully.
- Select Azure Active Directory from the SSO Provider drop-down menu.
- Click Save in the bottom-left corner of the screen.
Test SSO Integration
After you configure SSO in KCM GRC, we recommend that you test your SSO integration by following the steps below.
- Log in to your KCM GRC account.
- In the top-right corner of the screen, navigate to Settings > Account Settings.
- Click the SSO Settings tab on the View Account page.
- Click the Test SSO Configuration button.
- Click Continue in the SAML Integration Test window.
After you click Continue, a window will open to indicate whether the SSO configuration was successful. If the configuration was successful and you are logged in to Azure AD with the same email address that you use for KCM GRC, this window will redirect you to your KCM GRC dashboard.
If the configuration was unsuccessful, this window will redirect you to a "This page can't be found" error screen. Please review the instructions in this article to verify that you configured SSO correctly in Azure AD and KCM GRC. Then, if you still encounter the error, please contact our KCM GRC support team.