single sign on Archives | SnapSurveys Support documentation for Snap Surveys products Wed, 12 Nov 2025 16:33:35 +0000 en-GB hourly 1 https://wordpress.org/?v=6.8.3 https://www.snapsurveys.com/support-snapxmp/wp-content/uploads/2020/07/favicon-32x32-1.png single sign on Archives | SnapSurveys 32 32 Setting up an Identity Provider for Snap XMP Online https://www.snapsurveys.com/support-snapxmp/snapxmp/setting-up-an-identity-provider-for-snap-xmp-online/ Wed, 12 Nov 2025 16:33:34 +0000 https://www.snapsurveys.com/support-snapxmp/?post_type=epkb_post_type_1&p=14666 This document details how to set up Microsoft Azure AD and OKTA as Identity providers for Snap XMP Online. Setting up Microsoft Azure AD/Entra ID Register a new Enterprise Application Click “New registration” under Enterprise Applications. Set up Single Sign On By default, Microsoft does not seem to give access to SAML functionality. One way […]

The post Setting up an Identity Provider for Snap XMP Online appeared first on SnapSurveys.

]]>
This document details how to set up Microsoft Azure AD and OKTA as Identity providers for Snap XMP Online.

Setting up Microsoft Azure AD/Entra ID

Register a new Enterprise Application

Click “New registration” under Enterprise Applications.

Set up Single Sign On

By default, Microsoft does not seem to give access to SAML functionality. One way to get this working is to select the “Microsoft Entra SAML Toolkit” from the gallery and customise. To find it, search for “entra saml”

Select the entry “Microsoft Entra SAML Toolkit”. In the popup window, change the name and logo, and click “Create”.

Go to the Single sign-on section of the application:

Select “SAML”.

Enter the required information. shows online1.snapsurveys.com as an example:

When finished, the first configuration section should look like this (allowing for URL):

NB: We do not use the Relay State so this does not need to be filled in.

Add the “username” Claim

Click edit in the “Attributes and Claims” section and add the username claim, pointing to the user.mail address. This tells Snap XMP Online how to find the correct user details for log in.

When finished, the second section should look like this:

Provide values for configuration in Snap XMP Online:

From the third and fourth sections, we need to add the following information:

  • App Federation Metadata Url
  • Login URL
  • Microsoft Entra Identifier
  • Logout URL

Setting up OKTA

Log in as Admin – you can find this option in the top-right of the OKTA interface, by your username. You should get to this admin screen:

Select “Create New App”. You should see a pop-up dialog:

Select SAML 2.0 and press “Next”.

Give the new app a name and click “Next”.

 The Single Sign-On URL needs to be set to: https://online1.snapsurvey.com/SnapOnline/Saml2/Acs. The SP Entity ID needs to be set to: https://online1.snapsurveys.com/SnapOnline.

Add an attribute statement with the Name “username” and the value “user.email”. This is to allow Snap XMP Online to match the OKTA user to a Snap XMP Online user.

 

 The next screen contains the information needed for Snap XMP Online:

  • Metadata URL
  • Sign on URL
  • Sign out URL
  • Issuer

 

The post Setting up an Identity Provider for Snap XMP Online appeared first on SnapSurveys.

]]>
Inbox set up when using OAUTH and Microsoft Office 365 https://www.snapsurveys.com/support-snapxmp/snapxmp/inbox-set-up-when-using-oauth-and-microsoft-office-365/ Wed, 12 Nov 2025 16:33:09 +0000 https://www.snapsurveys.com/support-snapxmp/?post_type=epkb_post_type_1&p=14633 Setting up a Snap Online Inbox to access Office 365 email data requires authentication using OAUTH. This involves several steps in your Azure portal, on the Snap XMP Online server and in the Snap XMP Online admin user interface. Step 1: Set up in Azure portal The following links may help with registering an app: […]

The post Inbox set up when using OAUTH and Microsoft Office 365 appeared first on SnapSurveys.

]]>
Setting up a Snap Online Inbox to access Office 365 email data requires authentication using OAUTH. This involves several steps in your Azure portal, on the Snap XMP Online server and in the Snap XMP Online admin user interface.

Step 1: Set up in Azure portal

The following links may help with registering an app:

https://learn.microsoft.com/en-us/azure/active-directory/develop/quickstart-register-app and

https://learn.microsoft.com/en-us/exchange/client-developer/legacy-protocols/how-to-authenticate-an-imap-pop-smtp-application-by-using-oauth

Registering the app

In Azure AD click the App registrations link and then click the New registration link at the top left of the main pane. Give it a name and click the Register button.

Add new registration

 You should now see an entry in your registrations list.

From the left-hand size menu click on the Certificates and Secrets link.

To generate a certificate, you need to run a Power Shell script, like this example.

Certificate creation script
Run this script as an administrator
#--- config start
$dnsName = "snapsurveyscom.sharepoint.com" # Your DNS name
$password = "XXXXX" # Certificate password
$folderPath = "C:\downloads" # Where do you want the files to get saved to? The folder needs to
exist.
$fileName = "SelfSignedSep2022" # What do you want to call the cert files? without the file
extension
$yearsValid = 10 # Number of years until you need to renew the certificate
#--- config end
$certStoreLocation = "cert:\LocalMachine\My"
$expirationDate = (Get-Date).AddYears($yearsValid)
$certificate = New-SelfSignedCertificate -DnsName $dnsName -CertStoreLocation
$certStoreLocation -NotAfter $expirationDate -KeyExportPolicy Exportable -KeySpec Signature
$certificatePath = $certStoreLocation + '\' + $certificate.Thumbprint
$filePath = $folderPath + '\' + $fileName
$securePassword = ConvertTo-SecureString -String $password -Force -AsPlainText
Export-Certificate -Cert $certificatePath -FilePath ($filePath + '.cer')
Export-PfxCertificate -Cert $certificatePath -FilePath ($filePath + '.pfx') -Password
$securePassword

#https://laurakokkarinen.com/authenticating-to-office-365-apis-with-a-certificate-step-by-step/

 Note: You will need to change the $dnsName variable, check the $folderPath exists on the system where you want to run the script, and maybe consider changing the $fileName to something meaningful.

Set the $password variable to a password you will remember as you will need this when installing in the SOL server.

This generates a PFX file and a CER file.

Upload the CER file

In the Azure AD portal select the certificates tab and click the Upload certificate button and upload the CER file. On loading, the thumbprint will be displayed in the UI. 

Setting the app permissions

Next you need to set the permissions for the app.

On the left hand side choose API Permissions. Click Add a Permission and select APIs my organization uses. Type in ‘Office 365 Exchange’ in the “Start typing an API name or Application ID” field. 

API Permissions

 Click on the Office 365 Exchange Online to select it and then choose Application Permissions.

Permissions

 Under Application permissions find IMAP and POP3 and Mail.Read

Mail permissions required

 When the permissions are added you should see the following:

 If the status does not show as live, an Azure AD admin needs to approve the permissions.

Link the Exchange app to the Snap Online mailbox

In order for Snap Online to process the emails, you need to link the Snap Online mailbox user with the application registration.

The following Powershell commands need to be run by an Azure AD admin (The Microsoft.Graph Powershell SDK module may need to be installed/imported before these can be run). This script can be run from a Cloud Shell.

$TenantId = "" #Azure Tenant ID (GUID)
$AppName = "" #App name as created
$Mailbox = "" #Identity of mailbox to be used by Snap Online

#install-module microsoft.graph.applications
#import-module microsoft.graph.applications

Connect-MgGraph -TenantId $TenantId
$AppSP = Get-MgServicePrincipal -All | ? {$_.displayname -eq $AppName}
Connect-ExchangeOnline
New-ServicePrincipal -AppId $AppSP.AppId -ObjectId $AppSP.Id -DisplayName $AppName"SP" Add-MailboxPermission -Identity $Mailbox -User $AppSP.Id -AccessRights FullAccess

Step 2: Installing the certificate on the Snap Online server

 You will need to install the .PFX file on the Snap Online server.

Install the pfx

Copy the pfx file to the Snap Online server.

Open the file with the Certificate Import Wizard.

Select “Local Machine” and then click Next.

If the file name is not there, browse to it and click Next.

Enter the password, set in your Power Shell script earlier, and make sure that you select the check box for “Mark this key as exportable…”.

Click Next.

Change the radio button to “Place all certificates in the following store” and click Browse. Select the “Personal” store and click OK.

 Click Finish to complete the import.

The Certificate snap in should now be loaded.

Right click on the certificate you are using for OAuth and choose “All Tasks -> Manage Private Keys…”.

If you don’t see an entry for the IIS_IUSRS group then click the “Add..” button to find it in your Active Directory and add.

You need to give this group “Full control”.

Step 3: Snap Online Admin configuration

Log in as a Sysadmin account and select Configuration | Inbox accounts. Select the Add account option:

Fill in the relevant fields and select the ‘Use OAuth’ option and the following fields will become available to fill in:

Authority Url

The url of the server that returns the token to the client. For Office 365 mailboxes this is always https://login.microsoftonline.com

Tenant id

The unique identifier for your organisation within Azure AD.

OAuth Scopes

For Office 365 set to: https://outlook.office365.com/.default

Client id for OAuth

When you create a new app registration, Azure AD will allocate a GUID which is the client id. In Azure AD find your app registration settings and click ‘Overview’. The GUID can be found in the section ‘Essentials’ – ‘Application (client id)’.

OAuth Certificate thumbprint

Within the application in Azure AD, select ‘Manage’, and then select the link for ‘Certificates and Secrets’. In the main content page, select the tab ‘Certificates’. Your certificate should be listed with the thumbprint in the first column. If you do not have a certificate then you need to create one.

The post Inbox set up when using OAUTH and Microsoft Office 365 appeared first on SnapSurveys.

]]>