Identity provider management

Third-party identity providers (IdP), including ADFS, Azure Active Directory, Google G-Suite, Okta, Ping Identity, and Salesforce, can be configured to work with Prysm. When an IdP is configured, Prysm customers can sign in to Prysm using a single sign-on (SSO) with their company-issued credentials. This makes signing in to Prysm easier for users, and it simplifies user management for Org Admins.  In addition, Org Admins can invite new users and specify that new users are automatically assigned Prysm licenses to make it easier to allow users to collaborate in Prysm.

Note: The Prysm Remote Touch Console is not supported for IdP users.

Before you begin to configure identity providers

Before you begin, make sure the following people are participating in the process:

  • Prysm Org Admin
  • Identity Provider Administrator
  • Optional: Active Directory Administrator

About security and identity providers

For reference information about the benefits of integrating an Identity Provider with Prysm, see Enhancing security and user authentication.

Note: If you have a legacy Active Directory integration and you want to leverage a modern Identity Provider integration for user authentication, you must turn off the Active Directory setting in Admin Portal in the settings profile for each affected Prysm Application Appliance. See Disabling legacy Active Directory.

Process for configuring identity providers

Configuring your enterprise identity provider (IdP) to work with Prysm is a process that requires you to complete several steps in your identity provider and in Prysm. When you're done with the entire process, your Prysm users can sign in using SSO and their company-issued credentials.

Warning: The steps below outline the entire process. Several steps of the process include links to step-by-step instructions that you need to complete. It's important that you complete all steps in the process and all the step-by-step instructions. If you don't, you can unintentionally lock all your Prysm users out of their accounts.
Top