Unable to render embedded object: File (Emp18Notice.png) not found.

Skip to end of banner
Go to start of banner

Configuring Yammer as an Identity Provider

Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 4 Current »

The EmpowerID SSO framework allows you to configure Yammer as an identity provider for the EmpowerID Web application. EmpowerID integrates with Yammer using the OAuth protocol to allow your users to log in to EmpowerID using their Yammer account.

This topic describes how to configure an IDP connection for Yammer and is divided into the following activities:

  • Adding the Consumer Key, Consumer Secret and Redirect URI to the Yammer OAuth Connection
  • Adding MFA Points to the Yammer OAuth Connection
  • Adding a Login Tile for Yammer
  • Testing the Yammer connection

As a prerequisite to creating an SSO Connection for Yammer as an Identity Provider, you must have a Yammer account and register the EmpowerID web application for your organization in the developer's section of the Yammer site. This creates a set of values known by Yammer and the EmpowerID web application that allow the two to enter into a federated trust relationship. These values include the Client ID and the Client Secret (these values are generated by Yammer), as well as the Redirect_URI. (This value is entered by you to tell Yammer where to post the assertion of a user's identity to the EmpowerID Assertion Consumer Service).

For specific directions on registering EmpowerID as an application in Yammer, see the information provided by Yammer at https://www.yammer.com.


When registering EmpowerID in Yammer, use the following URL as the Callback or Return URL, replacing "FQDN_OF_YOUR_EMPOWERID_SERVER"with the FQDN of the EmpowerID Web server in your environment.

https://FQDN_OF_YOUR_EMPOWERID_SERVER/webidpforms/oauth/v2

Once the IDP Connection has been set up for Yammer, you can create a link similar to the one below to allow users to login to EmpowerID using Yammer. Be sure to replace "FQDN_OF_YOUR_EMPOWERID_SERVER" with the FQDN of the EmpowerID Web server in your environment and "Yammer" with the name of the IDP connection you create for Yammer in EmpowerID.

https://FQDN_OF_YOUR_EMPOWERID_SERVER/WebIdPForms/Login/EmpowerIDWebSite/Yammer?returnUrl=%2FWebIdPForms%2F




To add the Client ID and Client Secret to the Yammer OAuth Connection

  1. From the Navigation Sidebar of the EmpowerID Web interface, expand Admin > SSO Connections and click OAuth.
  2. From the OAuth Applications management page, click the OAuth Service Provider tab and then search for Yammer.
  3. From the OAuth Service Provider grid, click the Yammer link.




  4. From the External OAuth Provider Details page that appears, click the Edit button for the specific Yammer connection you want to edit. By default, EmpowerID includes one connection. However, you can add as many connections for Yammer as your organization needs.




  5. In the OAuth Connection pane that appears, type the Client ID Yammer generated for your application in the Consumer Key field and the Client Secret in the Consumer Secret field.




  6. Click Save to close the OAuth Connection pane.
  7. Prepend the value of the Callback Url with the FQDN of your EmpowerID Web server, using the https scheme. For example, the FQDN of the EmpowerID Web server in our environment is "sso.empowersso.com" so the full Callback Url for our site is "https://sso.empowersso.com/empoweridwebidpforms/oauth/v2".
  8. Click Save to close the OAuth Connection pane.
  9. Optionally, add any desired MFA points to the Yammer application by following the below steps.

To add MFA points to the Yammer application

  1. From the External OAuth Providers page for Yammer, click the Provider Edit link at the top of the page.
  2. In the MFA Point Value field, type the number of MFA points you want to give to users logging in with Yammer.
  3. Click Save.

Next, add a login tile for Yammer to the desired IdP Domains. This allows your users to authenticate to EmpowerID with their Yammer credentials. If you have not set up an IdP Domain for your environment, you can do so by following the directions in the below drop-down.

To add a Login Tile for Yammer

  1. From the Navigation Sidebar, expand Admin > Applications and Directories > SSO Connections and click SSO Components.
  2. Select the IdP Domains tab and then click the link for the IdP domain for which you want to add a login tile.




  3. In the IdP Domain Details page that appears, click the External OAuth Providers tab and check the box beside Yammer.




  4. Click Save.

    To give users the ability to log in using their EmpowerID credentials, be sure to select EmpowerID from the SAML Identity Providers tab of the IdP Domain Details page.


To test the Yammer IdP connection

  1. From the Navigation Sidebar, expand IT Shop and click Workflows.
  2. From the Workflows page, recycle the EmpowerID App Pools by clicking Recycle EmpowerID App Pools.




  3. Log out of the EmpowerID Web interface and navigate your browser to the domain name you configured for the Yammer IdP connection.
  4. Click the Login using Yammer button.




  5. This redirects your browser to the Yammer Login for the EmpowerID web application you created in Yammer. Enter your Yammer credentials and click Log In.




  6. Yammer directs you to the Access Request page for the EmpowerID application you created in Yammer. Click Allow to allow EmpowerID to retrieve the information in needs to link the Yammer account to your EmpowerID Person.




    This permissions page only appears the first time you log in to EmpowerID with your Yammer account. Subsequent logins simply redirect your browser from the Yammer login page to the EmpowerID web application.

  7. Back in the EmpowerID Web application, click Yes to indicate that you have an EmpowerID login.




    Users without EmpowerID Persons can request EmpowerID accounts by clicking No. This initiates the Create User Account workflow, which displays a form in the browser to allow the user to fill in the appropriate information. If a user submits the request, EmpowerID routes that request to those individuals in your environment with the ability to approve or deny the request and returns the user to the EmpowerID Web login.

  8. Type your EmpowerID Login or Email in the form and click Submit. The EmpowerID Person must have a valid email address as EmpowerID sends a one-time password to that address.




  9. Check your email for the one-time password.
  10. Back in the EmpowerID Web interface, type the one-time password into the Password field of the One-Time Password Validation form and click Submit.





Upon successful submission of your one-time password, EmpowerID logs the user in and joins the Yammer account to their EmpowerID Person account.

If you have set up the user's Password Manager policy to require the user accumulate a specific number of trust points beyond those granted by the identity provider, EmpowerID will direct the user through any Multi-factor methods you have enabled on the policy until they reach the needed point threshold to log in.

On this page



  • No labels