User Guides
Admin console EMS
Users
Add and import users
Search and filter
Bulk update
User profile
User settings
User groups
Devices
Events
Lone Worker
Dynamic frontend
User Groups
Events
Event settings
Advanced event settings
Text / Images / Audio
Recipients and permissions
Document sets
Time plan
Chat
Channels
Conference call
Documents
Checklists
Event Log
On Duty Log
Auth Groups
Tasks
Lone Worker
Lone Worker Overview
Lone Worker Settings
Vertical / Tilt Alarm
No Moving Alarm
Wifi Connection Check
Find me Alarm
Pre alarm
Customized Confirmation
SOS Alarm
Settings
Default channel settings
Event states
Event State Sets
Channels configuration
Conference Call
Sync Users
SMS Settings
Call Settings
Edge Settings
Activation
E-Mail Templates
Acronyms
Beacon
Perimeter Provider
Digital Signage
Beacon Monitoring
Notification Personalization
Application Configuration
Tenant Configuration
Channel Sequences
Media
Technical Integration Guides
Release Notes
- All Categories
- Technical Integration Guides
- SSO via OAuth 2.0 / OIDC
SSO via OAuth 2.0 / OIDC
SSO with any IDP. In general, s.GUARD supports single sign on (SSO) with any identity provider (IDP) which uses the OAuth 2.0 or OIDC standard. To configure a SSO integration for the s.GUARD system,…
SSO with any IDP
In general, s.GUARD supports single sign on (SSO) with any identity provider (IDP) which uses the OAuth 2.0 or OIDC standard.
To configure a SSO integration for the s.GUARD system, you need to provide the following information to the s.GUARD support team:
- Authorization URL
- Token URL
- Client ID
- Client secret value
In return, you will receive the redirect URL from s.GUARD support.
SSO with Entra ID
This section describes the required steps to configure SSO via OIDC in Microsoft Entra ID:
- Log in to Microsoft Azure portal
- Go to "Microsoft Entra ID"
- Open "Enterprise Applications"
- Click "+ New application", then "+ Create your own application"
- Define a name for the application (e.g. "s.GUARD SSO")
- Select "Integrate any other application you don't find in the gallery (Non-gallery)"
- Confirm with "Create"
- Go to "Manage -> Properties" and click on the link "application registration"
- Select "Manage -> API permissions" and click "+ Add a permission"
- Select "Microsoft Graph" and click on "Delegated permissions"
- Check "User.Read" and click "Add permissions"
- Click "Grant admin consent....."
- Go to "Authentication"
- Click "+ Add a platform" and select "Single-page application"
- Set redirect URIs to:
- https://admin.instasolution.ch/*
- https://app.instasolution.ch/*
- Click again "+ Add a platform" and select "Mobile and desktop applications"
- Set redirect URIs to:
- ch.instaguard2.insta://oauth2redirect/identity-provider
- idp.instasolution.ch://auth/idp
- http://localhost:3456/auth_callback
- http://localhost:4200/callbackCloak/*
Silent login for the Windows desktop client