Azure is a SAML identity provider that will authenticate your Lattice users trying to sign in. By setting up Lattice for SSO within your Azure Active Directory, your users will no longer need to remember an extra password to sign into Lattice, and you can quickly remove their access to Lattice from a centralized control panel. Find a list of other SAML providers Lattice integrates here: "Adding SSO to Lattice".
Please note: For Microsoft's detailed step-by-step guide around creating a SAML application, check out Microsoft's Quickstart Guide.
Add an Application
Step 1: Within the Azure Active Directory, select "Enterprise applications."
Step 2: Select "+ New application."
Step 3: Select "+ Create your own application." Name the app (we recommend naming the app "Lattice") and then select "Integrate any other application you don't find in the gallery (Non-gallery)."
Configure SSO for the Lattice app
Step 1: Within the Manage section, enter the "Single sign-on" pane.
Step 2: Select "SAML" as the single sign-on method.
Step 3: Under "Basic SAML Configuration", select "Edit."
Step 4: Add the Identifier (Entity ID), Reply URL (Assertion Consumer Service URL), and Sign on URL with the following:
Where "[subdomain]" is your Lattice subdomain. For example, if your organization's Lattice URL is "https://bigco.latticehq.com", "bigco" would be your subdomain and your ACS URL would be:
Assign users to the Lattice App
Step 1: Enter the Azure AD portal and select "Enterprise applications." Find the Lattice app previously created.
Step 2: Within the left navigation menu, select "User and Groups" and click "Add user."
Step 3: Select the "Assign" button at the bottom of the pane.