Users with SSO enabled will be redirected to Azure sign-in page on the second step of authentication (step 1 being entering the email address - we check whether this email has SSO enabled or not) where they will sign into their Azure account, upon successful sign-in, they will be signed into the Intermedia app. Create an exception list that will exclude users from using SSO, thus meaning they will have to use Intermedia credentials to sign in.And to my understanding and suggestions over the internet if this was a Permission related issue, it should never allow login but it does.Once Azure AD is connected it will allow to: Not sure if I am missing something, but haven't found anything related to this exact problem other than a few like which does not work for me. So as of now, I've got 2 different Applications created in Microsoft Identity Platform and I reuse the same App Id (switching them every time one stops working) and as soon as I change the App Id, the login starts working. However, a strange error that I am getting while logging in is that the authentication pages goes into a redirect loop every other day.Īs per now the immediate fix for me is to change the Application/Client ID for the application in my web.config file. ![]() I've followed all the steps given in the official documentation and it works fine. I need to allow users to login through Corp network to access an internal web application.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |