This the multi-page printable view of this section. Click here to print.

Return to the regular view of this page.

SSO Integrations

The Zing Data platform supports the following single sign on providers. Please reach out to us at hello@getzingdata.com to get support for an SSO provider that is not yet listed, and we’d be happy to assist.

1 - Microsoft Entra ID / Active Directory

Microsoft Entra ID (formerly Azure Active Directory) is a comprehensive identity and access management (IAM) solution providing:

  • Single sign-on (SSO): Access multiple applications with one set of credentials.
  • Multi-factor authentication (MFA): Add an extra layer of security.
  • Conditional access: Grant access based on specific conditions.
  • Directory synchronization: Easily manage user identities across systems.

Integration Setup

  1. Go to the Azure Portal
  2. Navigate to Microsoft Entra or Azure Active Directory.
  3. Click on App Registrations.
  4. Then click on New Registration.
  5. Fill the details like the example below.
  6. Click Register
  7. Once the app is registered, we need to go to Expose an API on the left side menu.
  8. Click on Add a scope.
  9. Fill the details like the example below. (Make sure to use Admins and users for the options “Who can consent?”.
  10.  Once you click in Add scope in the bottom, On the left side menu, click on API permissions.
  11. Click on Add a permission.
  12. Click on Microsoft Graph.
  13. Click on Delegated permissions and then select email and profile like the example below and click Add Permission.
  14. Click on Add a permission again, but this time switch to the second tab on top APIs my organization uses and find the Zing Data API previously created.
  15. Click again in Delegated permissions and select the Zing Access permission and then click Add permissions.
  16. On the left side menu, click on Token configuration and then click Add optional claim. You must choose Token Type: Access and then select email family_name and given_name claims, then click Add on the bottom.
  17. Click on Manifest on the left side menu and click on tab AAD Graph App Manifest, then change the variable accessTokenAcceptedVersion to 2 as in example below.
  18. Last step is to configure access to mobile applications. Click on Authentication on the left side menu and click on Add a platform (Single-page application with Redirect URIs should be already configured).
  19. Then fill it with the appropriate information for Android and iOS apps:
    iOS:
    Bundle ID: com.getzingdata.app
    Android:
    Package name: com.getzingdata.android
    Signature hash: cnsx6OCEI/rJQqehq6baXX93c6w=

With all the steps above completed, everything should be in place for your SSO configuration in Microsoft Azure.

As a last step, please click on Overview in the left side menu and copy the Application (client) ID and Directory (tenant) ID values and send these values to the Zing Data enterprise support team to complete the integration.

 

2 - Okta SSO

Okta is a comprehensive identity and access management (IAM) solution providing:

Overview

This guide will help you configure Single Sign-On (SSO) between Okta and Zing Data, allowing your team members to securely access Zing Data using their Okta credentials.

Prerequisites

  • Admin access to your Okta Access Gateway
  • Admin access to your Zing Data account
  • A valid Zing Data Enterprise subscription

Configuration Steps

Step 1: Add Zing Data in Okta

The Okta Access Gateway is a separate product from Okta. You can find it in the Okta Admin Console.

  1. Log in to your Okta Access Gateway Admin Console
  2. Navigate to Applications > Applications
  3. Click Add Application
  4. Click Create New App
  5. Select:
    • Platform: Web
    • Sign-on method: SAML 2.0
  6. Click Create

Step 2: Configure SAML Settings

In the SAML Settings section, enter the following:

General Settings:

  • App name: Zing Data
  • App logo (optional): [Download Zing Data logo]

SAML Settings:

  • Single Sign-On URL: https://console.getzingdata.com/login-sso
  • Audience URI (SP Entity ID): https://console.getzingdata.com
  • Name ID format: EmailAddress
  • Application username: Email

Attribute Statements (optional):

  • email: user.email
  • firstName: user.firstName
  • lastName: user.lastName

Step 3: Assign Users

In Okta:

  1. Navigate to your Zing Data application
  2. Go to the Assignments tab
  3. Click Assign > Assign to People
  4. Select users or groups to grant access
  5. Click Save

Step 4: Zing Data Configuration

Email us at support@getzingdata.com with the above details to get your Zing Data SSO configuration completed.

Testing the Integration

  1. Log out of Zing Data
  2. Access your Okta dashboard
  3. Click on the Zing Data tile
  4. You should be automatically signed in to Zing Data

Troubleshooting

If you encounter any issues:

  • Verify all URLs and certificates are correctly copied
  • Ensure users are properly assigned in Okta
  • Check that the email addresses match between Okta and Zing Data
  • Contact Zing Data support at [support email] for additional assistance

Additional Resources