Azure (SSO)
- 1 About Azure Active Directory single sign-on (SSO) integration
- 2 Prerequisites
- 3 Required permissions
- 4 Scenario description
- 5 Add Campus Cafe from the gallery
- 6 Choose Microsoft groups/users that may access Campus Cafe
- 7 Set up single sign on
- 8 Set up certificate
- 9 Users in Campus Cafe
- 10 Disable Campus Cafe password change
- 11 Configure error message for user not in Campus Cafe
- 12 Configure Campus Cafe logout button behavior
- 13 Time out behavior
About Azure Active Directory single sign-on (SSO) integration
Campus Cafe can utilize Microsoft Azure Active Directory to authenticate users logging in to Campus Cafe. If you want applicants and students to automatically be created in Azure upon their creation in Campus Cafe, you should follow these directions and then configure Azure Activity Directory to create accounts.
In this tutorial, you'll learn how to integrate Campus Cafe with Azure Active Directory (Azure AD). When you integrate Campus Cafewith Azure AD, you can:
Control in Azure AD who has access to Campus Cafe.
Enable your users to be automatically signed in to Campus Cafe with their Azure AD accounts.
Manage your accounts in one central location - the Azure portal.
To learn more about SaaS app integration with Azure AD, see What is application access and single sign-on with Azure Active Directory.
Once SSO and users are configured, users can access Campus Cafe by through the Office.com portal by clicking All apps then Campus Cafe. Alternatively, users can be directed to https://{Your-School-Code}-web.scansoftware.com/cafeweb/loginsso
Prerequisites
To get started, you need the following items:
An Azure AD subscription. If you don't have a subscription, you can get a free account.
Contact Campus Cafe Support for a metadata file.
Create Campus Cafe permission groups for users.
Required permissions
Module | Number | Description |
---|---|---|
System Admin | 127 | Create users in Campus Cafe |
System Admin | 465 | Configure error message for user not in Campus Cafe |
System Admin | 435 | Configure Campus Cafe logout button behavior |
Scenario description
In this tutorial, you configure and test Azure AD SSO.
Campus Cafe supports SP initiated SSO.
Once you configure Campus Cafe you can enforce session control, which protect exfiltration and infiltration of your organization’s sensitive data in real time. Session control extend from Conditional Access. Learn how to enforce session control with Microsoft Cloud App Security.
Add Campus Cafe from the gallery
To configure the integration of Campus Cafe into Azure AD, you need to add Campus Cafe from the gallery to your list of managed SaaS apps.
Sign in to the Azure portal using either a work or school account, or a personal Microsoft account.
In the upper left click the three-bar main menu.
On the left navigation pane, click Azure Active Directory or Microsoft Entra ID.
Click Enterprise Applications > All Applications.
Click New application.
In the Search application box, type Campus Cafe.
Click Campus Cafe.
Click Create.
Wait a few seconds while the app is added to your tenant; a new screen will appear; when the new screen appears proceed to choosing groups/users that may access Campus Cafe.
Choose Microsoft groups/users that may access Campus Cafe
Specify the Microsoft groups and/or specific users that may access Campus Cafe. Campus Cafe recommends first giving access to a test user and then returning to add the production groups/users.
Click the Assign users and groups tile.
Click Add user.
Choose your group(s) or specific user(s) and Assign them.
Set up single sign on
Return to the Campus Cafe Enterprise Application overview screen. If you were on the Users and Groups screen, on the left click overview.
Click the Set up single sign on tile.
Click the SAML tile.
Click Upload metadata file.
Select the file sent from Campus Cafe support.
Click Add. A new sidebar will open and the relevant fields will populate automatically based on the metadata file.
In Sign-on URL enter a URL using the following pattern:
https://{Your-School-Code}-web.scansoftware.com/cafeweb/loginsso
Click Save.
In the upper right click the X.
Do not Test if given the option.
Set up certificate
In the SAML Signing Certificate box, click Add a certificate.
Click New Certificate.
Signing Option: Sign SAML assertion.
Signing Algorithm: SHA-256.
Click Save.
In the upper right click the X.
In SAML Signing Certificate next to Federation Metadata XML click Add a certificate.
For the Signing Option select Sign SAML assertion.
For the Signing Algorithm select SHA-256.
Click Save.
The SAML Signing Certificate should now appear; Next to Federation Metadata XML click Download.
Save the file to your computer.
Send the file to Campus Cafe support.
Users in Campus Cafe
For a SSO user to authenticate with Azure, the user must have a user account in Campus Cafe. The username in Campus Cafe must match the Azure username. If you want applicants and students to automatically be created in Azure upon their creation in Campus Cafe, you should follow these directions and then configure Azure Activity Directory to create accounts.
Manually create account in Campus Cafe
Go to Admin > Permissions.
Click Lookup Person.
Search for the individual for which to create or edit an account and select the individual.
In Permission Group select the Campus Cafe permission group that will control access within Campus Cafe
In Username enter the user's Azure username (typically the user's institution-provided email).
Ensure Password is blank.
Click Save.
Campus Cafe recommends removing all passwords stored in Campus Cafe to avoid conflicting credentials.
Disable Campus Cafe password change
With Azure controlling authentication, users should change passwords through Azure, not Campus Cafe. To avoid confusion, Campus Cafe recommends disabling the change password link for all Campus Cafe permission groups. Set permissions #206 and #235 to NA for all permission groups.
Configure error message for user not in Campus Cafe
If a user belongs to a Azure group that has access to Campus Cafe, the user will see a link to Campus Cafe on his or her apps page. If the user doesn’t have an account in Campus Cafe but tries to access Campus Cafe, they’ll see an error. You can control what this error message says.
Customize the error message:
Go to Admin > Adjustable Text.
In Search enter LOGINSSO_ERROR.
Next to LOGINSSO_ERROR click the pencil.
In Value (the large box) enter the error message to display to a user. (e.g. You do not have access to Campus Cafe. Contact IT Support at 555-5555 for assistance.)
Click Save.
Go to Admin > Refresh Data Cache.
Configure Campus Cafe logout button behavior
By default, clicking the logout button in Campus Cafe does not end the SSO session. With the SSO session still active, a user will be able to access Campus Cafe without logging in.
Configure logout button to end SSO session:
Go to Admin > Web App.
In Search enter LOGOUT_SSO_URL.
Select the checkbox next to LOGOUT_SSO_URL and click Edit Selected.
In Value enter https://***-web.scansoftware.com/Shibboleth.sso/Logout replacing *** with your school code.
Click Save.
Time out behavior
By default, Campus Cafe signs out a user after 30 minutes of inactivity. (This may be extended by contacting Campus Café support.) However, the user’s SSO session will remain active for as long as configured through the SSO. If the SSO session is still active, the user can access Campus Cafe without logging in. Essentially, the SSO time out setting takes precedence over the Campus Cafe time out.