# Account

The Account Settings page allows you to manage your Reblaze user accounts.&#x20;

## **Tab: Your account details**

![Your account details](https://2672114182-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-LuRghgerfT6t9aVOOha%2F-Mb6pqPxhmkZ9Lm5_fSB%2F-Mbf7Xj7rdwV7FneLmnV%2FRBZDEVEVGENIYL%20_%20Account%202021-06-08%2012-51-43.png?alt=media\&token=0e8157ad-7e87-46e3-a300-b4b05e0a8d6d)

### Basic account settings

From this tab, you can reset your password, name, and phone number.&#x20;

### Settings for OTPs (One Time Passwords)

Reblaze uses 2FA (two factor authentication). There are several options for sending an OTP when you login:

* If only an email address is provided, the OTP will be sent via email.
* If a phone number is provided, the OTP will be sent over SMS message.
* As an alternative, you can also get a QR code for use in apps such as Google Authenticator (available for both [Android](https://play.google.com/store/apps/details?id=com.google.android.apps.authenticator2) and [iPhone](https://itunes.apple.com/il/app/google-authenticator/id388497605)).&#x20;

### API Key

This tab also offers a personal API key, to be used in all requests to the Reblaze API.

## Tab: Users management

![Users management](https://2672114182-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-LuRghgerfT6t9aVOOha%2F-Mb6pqPxhmkZ9Lm5_fSB%2F-MbfCXEOFboiXbjOOm8l%2FRBZDEVEVGENIYL%20_%20Account%202021-06-08%2013-38-45.png?alt=media\&token=a2c9a200-b5c3-4d70-9c7f-29c4e93ccd01)

This tab allows you to manage users that are attached to your organization. It is only available to users with administrator permissions.

### Administration

An admin can:

* Create a new user
* Edit an existing user
* Reset a user's password
* Delete a user

When a user account is being edited, this will appear:&#x20;

![Edit User](https://2672114182-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-LuRghgerfT6t9aVOOha%2F-Mb6pqPxhmkZ9Lm5_fSB%2F-MbfDPlAnfIyj53tU67g%2FRBZDEVEVGENIYL%20_%20Account%202021-06-08%2013-42-12.png?alt=media\&token=2cca70c4-6b19-4dc9-8c12-a70778261408)

The available Access Levels are:

* *Viewer*: can see the [Traffic](https://waap.docs.link11.com/v2.20/product-walkthrough/reblaze-traffic) section, i.e. the Dashboard and View Log.
* *Editor*: has all Viewer permissions, and can also configure security rulesets and policies in the [Security](https://waap.docs.link11.com/v2.20/product-walkthrough/security) and [Settings](https://waap.docs.link11.com/v2.20/product-walkthrough/settings) sections.
* *Organization Admin*: has all Editor permissions, and can also manage users via the Users Management page.
* *Reblaze Admin*: has all Organization Admin permissions, and can also edit and view the Notes, Init and Run pages.

## **Tab: Single sign-on configuration**

![](https://2672114182-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-LuRghgerfT6t9aVOOha%2F-Mb6pqPxhmkZ9Lm5_fSB%2F-MbfPGiAkOTqtIEx7BkK%2FRBZDEVEVGENIYL%20_%20Account%202021-06-08%2014-31-44.png?alt=media\&token=bf7a5440-63d5-443c-9ca1-74d140924d2d)

This tab allows SSO to be configured so that users have the ability to log into Reblaze with their **Okta** or **Microsoft** **Azure** accounts.

Configuration options will vary depending on the type of account.

{% hint style="info" %}
**Please note:** *In setting up an SSO account with Okta or Microsoft Azure, the screens you encounter on those sites may differ slightly from those appearing here. However, the information you will be required to provide for SSO set up and configuration will be the same as shown below.*
{% endhint %}

### Setting up SSO through Okta

#### **1. Initial Okta setup**

Go to [Okta](https://www.okta.com/). At the top of the page, click "Try Okta", register and create an application:

* Go to `https://{YOUR ACCOUNT}-admin.okta.com/admin/apps/active`
* Click **`Add Application`** → **`Create New App`**
* Choose `Platform: Web` and `Sign on method: SAML 2.0`

![](https://2672114182-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FIRmpkGX8y0mvi8hAYhjD%2Fuploads%2F7DmVXKrGx3QLTnyVRUjm%2FSetup-Okta-SSO-1.png?alt=media\&token=8b687e21-b181-4c56-9568-e17f0e4c057c)

#### **2. Name it, setup links and attributes:**

Give your app a name and click **`Next`**:

![](https://2672114182-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FIRmpkGX8y0mvi8hAYhjD%2Fuploads%2FClGXtyLVVD6vLyW8q4yN%2Fimage.png?alt=media\&token=9583bae7-9784-45d6-b810-b50a99d2e328)

**Now, configure the SAML integration**, as shown in the screen below.

In the **`Single sign-on URL`** field, enter the URL in the following format:&#x20;

`https://`{REBLAZE\_CONSOLE\_DOMAIN}`/sso/saml20/signon`<br>

In the **`Audience URI`** field, enter the URI in the following forma&#x74;*:*&#x20;

`https://`{REBLAZE\_CONSOLE\_DOMAIN}`/sso/saml20/audience`

\[Obtain *Reblaze Console Domain* URL from the Reblaze Log In.]&#x20;

![](https://2672114182-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FIRmpkGX8y0mvi8hAYhjD%2Fuploads%2FFYpuvsYh1b7hsHeNaAvF%2Fimage.png?alt=media\&token=24a8a7eb-fc99-4412-ad01-f736a4f5e2da)

Next, scroll down to the **`Attribute Statements (optional)`** section.

![](https://2672114182-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FIRmpkGX8y0mvi8hAYhjD%2Fuploads%2FFkJhI2ouGok0v5OViz1g%2FSetup-Okta-SSO-3.png?alt=media\&token=edfbeef6-bc11-43f6-8296-5d4a655391da)

1. In the **`Name`** column, write *`emailaddress`;* in the **`Value`** *c*olumn, write *`user.email`*
2. Click **`Add Another`**.
3. In the **`Name`** column, write *`displayname`;* in the **`Value`** *c*olumn, write                                     *`user.firstName + " " + user.lastName`*
4. Click **`Add Another`**.&#x20;
5. In the **`Name`** column, write  *`groups`;* in the **`Value`** *c*olumn, write *`appuser.rbzgroups`*
6. Scroll down, click **`Preview the SAML Assertion`,** then click **`Next`**.

The screen shown below will appear. Select **`I'm an Okta customer adding an internal app`**, then click **`Finish`** at the bottom of the screen.&#x20;

![](https://2672114182-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FIRmpkGX8y0mvi8hAYhjD%2Fuploads%2F1Qlx8Yij9qmu0zWv7fzW%2Fimage.png?alt=media\&token=21a74b69-8bdc-4376-b45c-d1cc30a01ade)

#### **3. Custom User profile**

Next, the Reblaze Admin group ID must be configured.&#x20;

On the left side of the Okta screen, under **`Directory`**, go to **`Profile Editor`** . The screen below will appear.

In the **`Users`** tab, select **`Apps`**.

![](https://2672114182-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FIRmpkGX8y0mvi8hAYhjD%2Fuploads%2FYkCVJvc0nn9aTRYFLeHp%2Fimage.png?alt=media\&token=25a1e56c-a1e5-4e29-b5bd-6e9a15754a99)

Scroll down and in the list of **`Profiles`**, locate and then click **`{$APP_NAME} User`**, where {$APP\_NAME} is the name you assigned to your app earlier.

![](https://2672114182-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FIRmpkGX8y0mvi8hAYhjD%2Fuploads%2FHOwjx08bE8RJYPM47lyc%2Fimage.png?alt=media\&token=a508ded6-472d-4027-b98e-a9ddfed4915c)

The following screen will appear. Under **`Attributes`**, click **`+ Add Attribute`**.

![](https://2672114182-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FIRmpkGX8y0mvi8hAYhjD%2Fuploads%2FAHSk5WFEQcbigBP9Kxer%2Fimage.png?alt=media\&token=15c53ef1-e57d-48a6-9ff1-35db90d8db95)

An **`Add Attribute`** window will appear. Complete the fields as shown below, then click **`Save`**.

![](https://2672114182-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FIRmpkGX8y0mvi8hAYhjD%2Fuploads%2FICGibkjE71URtfjtRrkf%2Fimage.png?alt=media\&token=5850ed68-5eb1-4bf6-b3fc-8fd184544e8e)

The next step is mapping. Return to the **`Profile Editor`** screen, and click on the **`Mappings`** tab.&#x20;

The window below will appear.

![](https://2672114182-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FIRmpkGX8y0mvi8hAYhjD%2Fuploads%2FKZFFiwdoykLdFjQ2Hml9%2Fimage.png?alt=media\&token=20c47ba6-896e-43b2-ad60-83a14f245f65)

Fill in the top field with `appuser.rbzgroups`. Click the arrow to the right of the field, and select the first option.

![](https://2672114182-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FIRmpkGX8y0mvi8hAYhjD%2Fuploads%2FNyNurdzX6OBfY1DY69jZ%2Fimage.png?alt=media\&token=21cd7465-44ed-4ae2-b9ce-b0f38c42161d)

At the bottom of the window, click **`Save Mappings`**, then click **`Apply updates now`**.

#### **4. Assign the application to users**

Create user groups for two possible access levels: **Admin** and **Read-Only access**.&#x20;

On the Okta menu on the left side of the screen:&#x20;

1. Under **`Directory`,** select **`Groups`**.&#x20;
2. A **`Groups`** screen appears; go to **`Add Group`**.  Add a group named `reblazeadmin`.
3. From the left-hand menu, under **`Applications`**, select **`Applications`**.&#x20;
4. An **`Applications`** screen will appear. Click your app's name. The screen shown below will open.&#x20;
5. In the **`Assignments`** tab, click the **`Assign`** dropdown and select **`Assign to Groups`**, as below.

![](https://2672114182-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FIRmpkGX8y0mvi8hAYhjD%2Fuploads%2FNtdhudQ5AtlO8BZ0ySll%2Fimage.png?alt=media\&token=7f8403ae-24fd-4a31-a090-103ed52208c1)

The following window will open. Select `reblazeadmin`, and click **`Assign`**.&#x20;

![](https://2672114182-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FIRmpkGX8y0mvi8hAYhjD%2Fuploads%2FlVbS4pgVwGQ02HEUd7bB%2Fimage.png?alt=media\&token=99f3a691-c51a-475d-a4ec-1a3f3b650d33)

The following window will open. Fill in the field as below, then click **`Save and Go Back`**. This will bring you back to the previous window (above), where you click **`Done`**.

![](https://2672114182-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FIRmpkGX8y0mvi8hAYhjD%2Fuploads%2Fjoj1rGlCsa9CtW0I8hI3%2Fimage.png?alt=media\&token=7fae9adf-c08f-4cd1-8879-fb90b3e7d43f)

Next, back at the app window, select the **`Sign On`** tab. In the window that appears, scroll down until the **`SAML Signing Certificates`** section. On the right hand side, click **`View SAML setup instructions`**.

![](https://2672114182-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FIRmpkGX8y0mvi8hAYhjD%2Fuploads%2FE1u6v60rUFGpUbjU8kbn%2Fimage.png?alt=media\&token=b89342f1-3e54-419e-af01-fc0287afc209)

This leads to the **`How to Configure SAML 2.0 for {$APP_NAME} Application`** page. You will use the information here in the next step.

#### 5. Complete Okta SSO setup in Reblaze

At this point, you must log into the Reblaze console. Go to your **Reblaze `Log In`** screen and complete all the fields, including the MFA PIN you will receive. Click **`Log In`**.

![](https://2672114182-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FIRmpkGX8y0mvi8hAYhjD%2Fuploads%2FVDq9pYzBNYgM2KSEG9aj%2Fimage.png?alt=media\&token=f38a5c9c-711a-4e3d-86c7-a71a631569f1)

This will bring you to the Reblaze console.&#x20;

1. From the menu on the left, under **`Settings`** select **`Account`**. Your Account page will open. Click the **`Single sign on configuration`** tab.
2. In the window that appears, select **`Enabled`**.
3. To obtain the URL for the **`Provider URL`** field, return to the Okta **`How to Configure SAML 2.0 for {$APP_NAME} Application`** page.&#x20;

![](https://2672114182-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FIRmpkGX8y0mvi8hAYhjD%2Fuploads%2FYSEL4jz4IjwoYc3Y0Jr2%2Fimage.png?alt=media\&token=82710450-e1db-4d04-9f25-42c24de3d3c5)

* Copy the url from the **`Identity Provider Single Sign-On URL`**, and paste it into the Reblaze **`Provider URL`** field.
* The following revisions must be made to the URL:&#x20;
  * Delete the following segment, highlighted in blue, from the URL you copied: ![](https://2672114182-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FIRmpkGX8y0mvi8hAYhjD%2Fuploads%2FvF53HfNakvdDRMUP5t4J%2Fimage.png?alt=media\&token=2ec86a4d-b21e-4bba-8535-1892764695e2)    \[`dev-7889665_mynewapp_1/`]
  * Now, add the suffix **`metadata`** to the end of the URL (after the segment ending: *saml/*).

4\. Fill in the name of the **`Admin Group`** (i.e., `reblazeadmin`).&#x20;

5\. Fill in the URL for the **`IDP Issuer`** field. To obtain the URL:&#x20;

6\. Return to the **`How to Configure SAML 2.0 for {$APP_NAME} Application`** page.

7\. Copy the URL from the **`Identity Provider Issuer`** field.&#x20;

8\. Paste it into the Reblaze **`IDP Issuer`** field.&#x20;

9\. Ignore the **`Audience URL`** and **`Assertion URL`** fields (they should be disabled automatically).

10\. Click **`Save`**. This will restart the console service.

![](https://2672114182-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FIRmpkGX8y0mvi8hAYhjD%2Fuploads%2FQ2da1XySd5vcDp5qvdMu%2Fimage.png?alt=media\&token=e581877c-a313-4570-a77c-30c5b27e9261)

On the Reblaze **`Log In`** page there will now be an additional button: **`SSO Login`**. Click to log into the Reblaze console.

### Set**ting** up SSO through Microsoft Azure

#### **1. Get started with Azure.**

Go to [this MS Azure page](https://azure.microsoft.com/en-us/solutions/active-directory-sso/) to sign in.&#x20;

![](https://2672114182-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FIRmpkGX8y0mvi8hAYhjD%2Fuploads%2FXFXf4lTHDNqnqt3sql1J%2Fimage.png?alt=media\&token=707f6a5d-3cb4-45f7-be9f-d806069b5ecb)

You will be redirected to the Default Directory page. From the side menu, select **`Enterprise applications`**.

#### **2. Create the SSO app.**

Choose  **`+ New Application`** , as shown below. &#x20;

![](https://2672114182-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FIRmpkGX8y0mvi8hAYhjD%2Fuploads%2FFarJ0H6pITTWKBHIL6IV%2FSetup-Microsoft-Azure-SSO-1.png?alt=media\&token=130c770b-2f5d-4d59-9e9c-21951aaac2dc)

In the screen below, choose **`+ Create your own application`** . &#x20;

Then, from the drop-down that appears, give your app a name and choose **`Integrate any other application you don't find in the gallery (Non-gallery)`**. Click **`Create`**.

![](https://2672114182-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FIRmpkGX8y0mvi8hAYhjD%2Fuploads%2FyvPrgqgSGPA31LbOxNop%2FSetup-Microsoft-Azure-SSO-2.png?alt=media\&token=4bcb26ae-e1e6-45e6-abc0-01c0d2c74d51)

#### **3. Define SAML links.**

On the next screen that appears, from the left menu, select **`Single sign-on`**, then choose **`SAML`:**

![](https://2672114182-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FIRmpkGX8y0mvi8hAYhjD%2Fuploads%2FbUtVjiAMj3amYG2iF6t8%2FSetup-Microsoft-Azure-SSO-3.png?alt=media\&token=b0ed4275-9b81-4f4a-b70c-4b77b5a7a698)

The screen below will appear. Click **`Edit`** in the first block (*Basic SAML Configuration*) on the left.&#x20;

<figure><img src="https://2672114182-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FIRmpkGX8y0mvi8hAYhjD%2Fuploads%2FXWCupm2LhPXzG7pFVl6y%2Fimage.png?alt=media&#x26;token=3bfeab64-9eda-4271-b2b6-b2e06476e704" alt=""><figcaption></figcaption></figure>

On the right, enter values for the **`Identifier (Entity ID)`** and **`Reply URL (Assertion Consumer Service URL)`** fields:

* The **`Identifier (Entity ID)`** should be provided by the customer. It must be unique for the customer’s SSO applications. The best option is to use something like: `customer_domain.com?sso=123`. Note that this should not contain the "https\://" prefix. Also note that this value will be entered into the **IDP** **Issuer** field in the Reblaze console.
* The **`Reply URL (Assertion Consumer Service URL)`** should be: `https://`{REBLAZE\_CONSOLE\_DOMAIN}`/sso/saml20/signon`, where the {REBLAZE\_CONSOLE\_DOMAIN} can be obtained from the Reblaze Log In.&#x20;

Click **Save** (at the top).<br>

<figure><img src="https://2672114182-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FIRmpkGX8y0mvi8hAYhjD%2Fuploads%2FO0svYGPpcBKmoiMPviQH%2Fimage.png?alt=media&#x26;token=f0f84feb-9970-4a24-b959-456e66e7890e" alt=""><figcaption></figcaption></figure>

#### **4. Get the Metadata XML link for later use.**

Copy the **`App Federation Metadata URL`** and save it for later. This will be used as the `Provider URL` value in the Reblaze console.

<figure><img src="https://2672114182-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FIRmpkGX8y0mvi8hAYhjD%2Fuploads%2FmDeC3VjhqGMwx8nOC1JT%2Fimage.png?alt=media&#x26;token=85ac5fbe-86c5-4be4-96a2-cc727a47d537" alt=""><figcaption></figcaption></figure>

#### **5. Set up** `user.groups` **in `Attributes & Claims`.**

In the second block of the screen below, click **`Edit`**.<br>

<figure><img src="https://2672114182-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FIRmpkGX8y0mvi8hAYhjD%2Fuploads%2FvPJHy1j5tf49OBsME6zx%2Fimage.png?alt=media&#x26;token=ba97077c-c334-462d-a5a1-0e8304598dfd" alt=""><figcaption></figcaption></figure>

The screen below will appear. Select  **`+ Add a group claim`**. &#x20;

<figure><img src="https://2672114182-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FIRmpkGX8y0mvi8hAYhjD%2Fuploads%2FgH80lVqD8gV5pIHnuPS4%2Fimage.png?alt=media&#x26;token=c7b02dba-0d9b-48c9-b7cf-69020419611a" alt=""><figcaption></figcaption></figure>

&#x20;From the drop down that appears on the right:

* Choose **`All groups`**
* Choose `Source attribute:`**`Group ID`**
* Click **`Save`**

<figure><img src="https://2672114182-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FIRmpkGX8y0mvi8hAYhjD%2Fuploads%2FA91HgP9BypaxloMXWvJS%2Fimage.png?alt=media&#x26;token=cedcfd49-a21f-4263-b663-04af3da638fc" alt=""><figcaption></figcaption></figure>

The following screen will appear.

<figure><img src="https://2672114182-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FIRmpkGX8y0mvi8hAYhjD%2Fuploads%2F6G55Grhd0bf8HPP32vgp%2Fimage.png?alt=media&#x26;token=97570353-6d85-45e5-ba40-cd8577a834d9" alt=""><figcaption></figcaption></figure>

#### **6. Add a user as a member of the application.**

Return to the **`Enterprise Application`** scree&#x6E;**.** From the left menu, click **`Users and Groups`.**&#x20;

Click the **`+ Add users/groups`** tab. Add users to the application by searching for a display name or through *application registration*.&#x20;

<figure><img src="https://2672114182-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FIRmpkGX8y0mvi8hAYhjD%2Fuploads%2FJ2QNn7grN1ECLpcxmoZ7%2Fimage.png?alt=media&#x26;token=72aab3f2-541d-4ab1-88dd-64bba86e9edf" alt=""><figcaption></figcaption></figure>

#### **7. Create an admin group and assign a user.**

Go to **`Azure Active Directory`** → **`Groups`**, and create a group by clicking on the **`New Group`**       tab.

Copy the `Object ID` and save it for later use. It will be the value for the **`Admin Group`** field in the Reblaze console.

<figure><img src="https://2672114182-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FIRmpkGX8y0mvi8hAYhjD%2Fuploads%2FzRvuahtLBHsUXQyvDCiW%2Fimage.png?alt=media&#x26;token=a06249f2-bf4e-4722-839b-255502c52369" alt=""><figcaption></figcaption></figure>

Click on the hyperlinked group name (`ReblazeAdmin`); the screen below will appear. Select  **`Members`** from the left menu.&#x20;

<figure><img src="https://2672114182-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FIRmpkGX8y0mvi8hAYhjD%2Fuploads%2FBF3DseD5xD7UU24gxBFs%2Fimage.png?alt=media&#x26;token=b952e1f8-3db2-4859-be9f-09a180c7e8c6" alt=""><figcaption></figcaption></figure>

Assign a user to the group:

<figure><img src="https://2672114182-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FIRmpkGX8y0mvi8hAYhjD%2Fuploads%2F41sxG0Rawc6GsOtW1AuH%2Fimage.png?alt=media&#x26;token=84ad0372-a7a2-4880-b078-71d7af7b012b" alt=""><figcaption></figcaption></figure>

#### **8. Complete Azure SSO settings in Reblaze.**

Go to the Reblaze console and sign in.

In the left menu, under **`Settings`**, select **`Account`**. When the screen below appears, click on the *`Single sign on configuration`* tab; set the **Enabled** checkbox.&#x20;

<figure><img src="https://2672114182-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FIRmpkGX8y0mvi8hAYhjD%2Fuploads%2F6g2nqXiCxGGuPFMWmybw%2FSSO%20image.png?alt=media&#x26;token=038e8d25-10ad-4fda-b5e5-5649cb754665" alt=""><figcaption></figcaption></figure>

For the remaining fields:

* Set **`Provider`** to `Microsoft`.
* Set the **`Provider URL`** to the value obtained in Step 4 (the **`App Federation Metadata URL`**).&#x20;
* Set the **`Admin Group`** to the value obtained in Step 7 (the `Object ID`).&#x20;
* Ignore the remaining fields. (**`IDP Issuer`** should have been set automatically, while **`Audience URL`** and **`Assertion URL`** should have been disabled.)

After the fields are filled in, click **`Save`**.
