---title: Configuring Windows Auth as an Identity Provider---
- Home
- Single Sign-On and MFA
- Configuring SSO Connections
- Identity Providers
- Current: Configuring Windows Auth as an Identity Provider
Configuring Windows Auth as an Identity Provider
The EmpowerID SSO Connector framework allows you to configure an Identity Provider connection for Windows Authentication to allow your users the ability to log in to EmpowerID using their Windows credentials.
For users to log in to EmpowerID using their Windows credentials, they must have user accounts either in the domain being protected by EmpowerID or in a domain trusted by that domain.
This topic describes how to configure an SSO connection for Windows Authentication and is divided into the following activities:
To configure the SSO Connection for Windows Authentication
From the Navigation Sidebar of the EmpowerID Web interface, navigate to the SAML Connections management page by expanding Admin > Applications and Directories > SSO Connections and clicking SAML. From the SAML Connections tab of SAML SSO Manager, search for Windows. From the SAML Connections grid, click the drop-down arrow for the Login Using Windows record and click Edit. From the General tab of the Connection Details page that appears, do the following:- Optionally, if you are using multi-factor authentication and you want to edit the default MFA Point Value for Windows auth, scroll to the Connection Details section and type a new value in the MFA Point Value field.
- Scroll to the Account Information section and select the directory for your AD domain from the Account Directory drop-down.
- Optionally, scroll to the Single Logout Configuration section and enter a logout URL in the Logout URL field.
- Leave all other fields as is.
If you have not set up an IdP Domain for your environment, you can do so by following the directions in the below drop-down.
- To create an IdP Domain
- From the Navigation Sidebar, navigate to the SSO Components management page by expanding Admin > Applications and Directories > SSO Connections and clicking SSO Components.
- Click the IdP Domains tab and then click the Add IdP Domain (+) button.
- Type the fully qualified domain name in the Domain Name field and then click Save.
If you want to give users the ability to log in to the IdP Domain using their EmpowerID accounts, add EmpowerID to the domain as a SAML Identity Provider. Other login options include social media applications like Facebook or LinkedIn.
To test the SSO connection
- From the Navigation Sidebar, navigate to the Workflows page by expanding IT Shop and clicking Workflows.
- From the Workflows page, recycle the EmpowerID App Pools by clicking Recycle EmpowerID App Pools.
- Log out of the EmpowerID Web interface and navigate your browser to the domain name you configured for Windows auth.
- When prompted, enter your Windows credentials and then click OK.
- Related Topics
Administrative Procedures:
- Creating IdP Domains
- Configure AD SF as an Identity Provider
- Configure Azure as an Identity Provider
- Configure Box as an Identity Provider
- Set up the Remote Windows Identity Provider Applications
- Configure Facebook as an Identity Provider
- Configure Google as an Identity Provider
- Configure LinkedIn as an Identity Provider
- Configure Paypal as an Identity Provider
- Configure Smart Card as an Identity Provider
- Configure Twitter as an Identity Provider
- Configure Yahoo as an Identity Provider
- Configure Yammer as an Identity Provider
- Creating IP Address Ranges
- Setting MFA Points Granted by SSO Connections