Securly supports single sign-on using Azure AD, in addition to authentication via G-Suite and Microsoft AD. This gives schools a wider array of authentication options depending upon the devices and environments they use.
Securly Azure AD Pre-requisites:
- Server available for Securly to install IIS. This server will be used as the Identity Provider( IdP)
- Azure AD Connect should be set up to upload users to from local Active Directory to Azure.
- All Windows and Mac computers are joined to the domain.
Note: Securly does not recommend installing Securly Azure AD on a server already running an IIS.
- Depending on which IIS version the Securly Windows server, deploy the appropriate script to your environment. The script can be found in the zip file from your Sales Engineer.
- Allow the execution of unsigned scripts by entering the following at Elevated/Administrative PowerShell - " Set-ExecutionPolicy Unrestricted "
- Depending on OS version and Azure sync filed choose the correct directory.
- Then run azure-setup.ps1.
- The script will install IIS, Enable Windows Authentication & set permissions.
- Once deployed verify that the site and file are accessible from clients on your network in the format - http://<servername>/securlysso/securlysso.aspx
- Now fetch OUs by going to - http://<servername>/securlysso/DebugFetchOUs.aspx?domain=<schooldomain>
- Support can now onboard your account.
- You will now be able to log into Securly Administrator console at www.securly.com
- Anyone that is a Global Administrator in Azure will be able to login to Securly.
- In the Securly Admin User Interface go to Global Settings.
- The Global Settings will have Intranet Address field that shows an URL that matches the server name
Note: Please contact support before running any of these files.