I am a Zivver admin
Configure and manage Zivver
SSO with Microsoft Entra ID
Introduction
Zivver supports Single Sign-On (SSO) via Microsoft Entra ID, allowing users to log in to Zivver using their workplace credentials. This manual explains how to set up SSO as a Zivver administrator.
SSO is based on Security Assertion Markup Language (SAML) v2.0. In this scenario, Microsoft Entra ID acts as the Identity Provider (IdP) and Zivver as the Service Provider (SP).
To activate SSO in Zivver, you need the following:
- You are a Zivver administrator.
- You have access to Microsoft Azure and an Entra ID subscription.
Configure SSO in Entra ID
The first step is to set up Zivver SSO in Entra ID.
- Log in to Microsoft Azure.
- Click Microsoft Entra ID.
- Under Manage, click Enterprise applications.
- Click add New application.
- Search for
Zivver
. - Select the Zivver app by clicking the Zivver tile.
- Click .
Wait until the Zivver app has been added. You will be automatically redirected to the control panel for the Zivver app. - Under Manage, click Single sign-on.
- Select the SAML tile.
A pop-up will appear asking you to save the single sign-on setting. - Click .
You should now see the Set up Single Sign-On with SAML configuration screen. - Click edit Edit at Attributes & Claims.
- Click the Unique User Identifier (Name ID) row.
You are redirected to the Manage claim page for this claim. - At Source attribute, select user.mail.
- Click Save.
- Check if the following claim exists. If not, click add Add new claim to create it.
Name | Namespace | Source | Source attribute |
---|---|---|---|
ZivverAccountKey | https://zivver.com/SAML/Attributes | [i18n] attribute | user.objectid |
user.objectguid (extension_<YourTenantID>_objectGUID)
from the dropdown menu as Source attribute instead of user.objectid.- Click Save.
- Go back to SAML-based Sign-on.
You might be prompted to test single sign-on with Zivver. If so, click . - Under SAML Certificates, click Copy file_copy at App Federation Metadata Url.
You need this URL in the Zivver admin panel in the next section.
Configure SSO in Zivver
The second step is to set up SSO in Zivver. You do this in the Zivver admin panel.
- Log in to the Zivver WebApp.
- Click
Organization Settings.
- Expand
User administration.
- Click Single Sign-on.
- Select Automatically recommended.
- Paste the URL copied from the previous section.
- Click .
- At the top of the page, click .
SSO is now configured in Zivver, and you are ready for the next section.
Zivver 2FA exemption (optional)
A Zivver account is protected by default with an additional login method (2FA). 2FA is also required when logging in via SSO. It is possible to disable Zivver’s built-in 2FA when users already log in to Entra ID with 2FA. This prevents users from having to complete 2FA twice.
With these authentication methods, Zivver does not ask for 2FA when logging in:
urn:oasis:names:tc:SAML:2.0:ac:classes:Password
urn:oasis:names:tc:SAML:2.0:ac:classes:Unspecified
urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport
Follow these steps to set the 2FA exemption for Entra ID in Zivver:
- Log in to the Zivver WebApp.
- Click
Organization Settings.
- Expand
User administration.
- Click Single Sign-on.
- Scroll down to the Zivver 2FA exemptions card.
- In the Authentication methods to be exempted field, enter these values:
urn:oasis:names:tc:SAML:2.0:ac:classes:Password
urn:oasis:names:tc:SAML:2.0:ac:classes:Unspecified
urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport
- Click .
You have now successfully set a 2FA exemption for Entra ID. When users log in via SSO, Zivver will not ask for 2FA.
Assign users to the Zivver application in Entra ID
The third step is to assign users to Zivver SSO in Entra ID.
- Log in to Microsoft Azure.
- Click Microsoft Entra ID.
- Under Manage, click Enterprise applications.
- Select Zivver from the list of installed Enterprise applications.
Tip
If you want to assign all users in your Entra ID to the Zivver application, you can also toggle Assignment required? to No on the Properties tab under Manage. This allows every Entra ID user with an active Zivver account to log in. If you use this option, you can skip the steps below. - Under Manage, click Users and groups.
- Click add Add user/group to add a user or group.
- Under Users, click the None Selected link.
- Search for users or groups to assign to the Zivver application and select them from the list.
Tip
To assign groups to the Zivver application in Entra ID, you need an Enterprise Mobility + Security E5 or Entra ID Premium P2 license. - Click .
- Click to confirm your selection.
The assigned users can now log in to Zivver, provided they have an active Zivver account.
Testing Single Sign-On
Log in to the WebApp with SSO
- Go to the Zivver WebApp.
- Enter your e-mail address.
- Depending on your role in Zivver:
- As a user: you are immediately redirected to your organization’s login screen.
- As an administrator: you choose between logging in with your Zivver password or your workplace credentials.
- Log in with your organization’s workplace credentials.
Depending on whether a 2FA exemption applies, you may be prompted for an additional login method. If a 2FA exemption is in place, this step is skipped. - Enter your additional login factor.
You are now logged in to the Zivver WebApp.
Log in to Outlook with SSO
In the Zivver Office Plugin for Outlook, you can log in via SSO using these steps:
- Click the Zivver tab.
- Click
Manage accounts.
- Click the link add_circle Add an account.
- Enter the e-mail address you want to use for login.
- Click .
You will be redirected to your organization’s login screen. - Log in with your organization’s workplace credentials.
Depending on whether a 2FA exemption applies, you may be prompted for an additional login method. If a 2FA exemption is in place, this step is skipped. - Enter your additional login method.
You are now logged in to Outlook.
References
For further reference, please see: