Spacer login

Enterprise Admin Tool

SSO Authentication Setup - ADFS

Below you will find requirements and instructions for enabling ADFS SSO for your organization using the Enterprise Management Interface.

Access Requirements

  • Administrative rights to your Beam organization.
  • Administrative rights to your ADFS server.

Enabling SSO Authentication

Begin by enabling AD FS authentication for your Beam organization.

  1. In a separate browser tab, log in to Your Account.
  2. You will be redirected to the Advanced Beam Management Dashboard.
  3. Select Organization from the main menu.
  4. Select Authentication from the section menu to view your Authentication Settings.
  5. Under Authentication Method, click Change next to Beam and/or Google Accounts.
  6. Select ADFS, then Continue.
  7. You will need to enter the IP address or hostname of your AD FS server, then Continue.
  8. Next, you will be provided with the option to allow guests access. Allowing guest access will let users not managed by your identity provider be a part of your organization.
  9. Finally, you will be provided with the option to edit the message sent to all users within the Beam organization informing them of this change.
  10. Click Confirm and Send E-Mail when complete.

The following instructions will complete the setup on your AD FS server:

  1. Open your ADFS management console.
  2. Click on Add Relying Party Trust. This will open a setup wizard.
  3. For the Federation metadata address, enter this URL: https://app.suitabletech.com/sso/metadata/
  4. You can click through the rest of the wizard to completion. Note: Multifactor Authentication is supported
  5. Right-click on the newly added trust and select Edit Claim Rules.
  6. You will now need to add three new claim rules: Attributes, name id, and transform name id. Please make sure that each rule created includes the exact information displayed in the following screenshots (the outgoing claim types are case sensitive):
    • Attributes - this will follow the Send LDAP Attributes as Claims rules template
      SSO attributes

    • name id - this will follow the Send LDAP Attributes as Claims rules template
      SSO name id

    • transform name id - this will follow the Transform an Incoming Claim rules template
      SSO transform name id

Domain Management
Finally, you must verify that your organization owns the domain associated with your user's email accounts. This can be done via DNS TXT or CNAME entry.

  1. Begin by selecting Add Domain.
  2. Enter the domain associated with your organization.
  3. Click Save Domain.
  4. A green notification box will appear indicating the domain has been successfully added.
  5. All domains must be verified with a DNS TXT or DNS CNAME.
    Note: Domain verification may take a few hours after saving.
    • Verify with DNS TXT
      • Select Verify with DNS TXT under Domain Management to view instructions for adding a TXT record to your host's DNS settings.
    • Verify with DNS CNAME
      • Select Verify with DNS CNAME under Domain Management to view instructions for adding a CNAME record to your host's DNS settings.

For additional information, email our Customer Success Department at This email address is being protected from spambots. You need JavaScript enabled to view it..