SSO Setup

Created by Teira Ellis, Modified on Mon, 29 Sep at 10:40 AM by Assist LUMA1

SETTING UP SSO - What is the process?

 

Schedule a Kick off call with LUMA1 technical team - Email: success@luma1.com


Client and LUMA1 confirm if the mapping of groups and supervisors is required as part of the SSO process. If so, additional planning  and technical services required.

 

 

Groups and Supervisor Administration

 

The Groups feature in LUMA1 allows administrators to control user access to content.  For example, a client can create 3 groups of users.  Group 1 can see all content, group 2 can only see content related to sales and group 3 can see content related to safety and skills.  The creation of groups is unlimited in LUMA1 and is one of the first activities completed as part of the administration setup. 

 

The supervisor setup allows for a hierarchy of users allowing the supervisor to view reporting activity for those users who are set under their supervision.  It also enables the notification features when using LUMA1 automation and certification to provide progress updates to supervisors for members under their supervision.

 

 

LEARNER EXPERIENCE WITH SSO

 

The viewer clicks a link via Client site (e.g., SharePoint or email) to launch LUMA1

 

SSO Validation Occurs:

 

If the learner’s browser is already signed into MS, and email address is validated as NAME@CLIENTDOMAIN.COM, then LUMA1 learner portal launches.

 

If the viewer’s browser is not logged into their Microsoft account, the Microsoft Sign in prompt will appear.

 

Graphical user interface, application

Description automatically generated

 

 SETUP

Azure Single Sign-on (SSO) for your LUMA1 environment. Below are the detailed steps to get started:

Azure SSO Setup Instructions for LUMA1

1) Register a new application

  1. In the Azure Portal go to Azure Active Directory (Entra) → App registrations → New registration.

  2. Name it (e.g., LUMA1 SSO).

  3. Supported account types: choose what fits your org (most use Single tenant).

  4. Click Register.

2) Configure API permissions

  1. Open your new app → API permissionsAdd a permission.

  2. Choose Microsoft GraphDelegated permissions.

  3. Add User.Read.

  4. Click Grant admin consent for <YourTenant> and confirm. ✅

    • Why: Many tenants restrict end-user consent; admin consent ensures reliable sign-in.

3) Configure authentication (redirect URI)

  1. Go to AuthenticationPlatform configurationsAdd a platformWeb.

  2. Under Redirect URIs, add:
    https://clientname.luma.one/azure/index.php
    (Replace clientname with your actual subdomain.)

  3. Save.

4) Create a client secret

  1. Go to Certificates & secretsClient secretsNew client secret.

  2. Add a description and expiry, then Add.

  3. Copy the Secret Value now—you won’t be able to see it again.

    Note: We need the Secret Value, not the Secret ID.

5) Send these details to LUMA1

  • Tenant ID

  • Application (Client) ID

  • Client Secret Value (again, the Value, not the ID)


Quick verification (optional)

  • In API permissions, you should see Microsoft Graph → User.Read (Delegated) with a green check and the label Granted for <YourTenant>.

  • In Authentication, confirm the exact redirect URI matches your LUMA1 subdomain.

Common pitfalls

  • Admin consent missing → users see “needs admin approval.”
        Fix: click Grant admin consent.

  • Wrong secret → using the Secret ID instead of Value causes token errors.

  • Redirect mismatch → any typo in the URI will block sign-in (must match exactly).


Authentication Endpoint
Once setup is complete, users will authenticate via the following URL:
This endpoint is already live, but currently not accepting authentication attempts until the Azure app is properly configured and connected.
Please note that if the FQDN part of the authentication URL (clientname.luma.one) ever needs to change, we can accommodate this with appropriate coordination. Just let us know in advance so we can ensure a smooth transition.

 

NOTE: Basic SSO is available using LUMA1’s standard SSO API. This API is available as an add on feature.  Additional technical service work is required to accommodate the Group and Supervisor setup to ensure proper definition and mapping of data. 

Was this article helpful?

That’s Great!

Thank you for your feedback

Sorry! We couldn't be helpful

Thank you for your feedback

Let us know how can we improve this article!

Select at least one of the reasons
CAPTCHA verification is required.

Feedback sent

We appreciate your effort and will try to fix the article