EVOLVE SSO

EVOLVE makes it easy to streamline your login experience with Single Sign-On (SSO), available for an additional fee. Our team will guide you through every step of the process to ensure a smooth, secure setup.

For details or to get started, contact your account manager or email support@evolvemep.com. Below, you’ll find an overview of the process and the key information your IT team may need to successfully implement SSO for your organization.

Requirements

  1. All users must be on EVOLVE 9.0 or greater, which supports Revit 2023 or newer.
    1. For Revit 2022 support, reach out to EVOLVE with this request.
    2. 360sync is not support for SSO, a user account can be setup as non-SSO as a workaround
  2. Once the account is set up, a meeting with IT & at least 1 Revit user will need to be avilable for a 30min call to complete the implementation
    1. During the implementation phase, your account will need 2 system admins.
  3. Updating to SSO does create a new user id for company members, so things like usage analytics will be impacted as the data will capture usage for 2 different id's even though the email is the same.
  4. Outside vendors (users without a company domain) can not be on SSO.

Process

  1. EVOLVE will activate your account to enable SSO
  2. Initial admin setup which will activate 2 accounts on SSO
    1. Admin 1 will delete Admin 2
    2. Admin 1 will re-invite Admin 2 and assign Admin role to the user.
    3. Admin 2 will delete Admin 1
    4. Admin 2 will re-invite Admin 1 and assign Admin role to the user.
      1. Add additional entitlements to each user if needed (Electrical, Mechanical, Shop, etc)
    5. Now both admins have enabled SSO and when logging to both the website or Revit, user should be prompted to utilize their SSO authentication.
      1. Note: Some web browsers may need to have the cache cleared (Ctrl-F5) after this change is made
  3. Once the account Admin has been switched over to SSO, they will need to delete every company member and re-invite each member back and assign their role and entitlement.
    1. Note: that all future new user invites into the system will automatically be enabled with SSO

IT Requirements

  1. Go into Azure Entra ID / Manage / All Applications, then click on + New application button
  1. Add the user into the application
  2. Click the Users and groups option in the left menu then click on + Add user/group button
  1. Click in None Selected,  Then use the check to select the user(s) from the list, finally press the Select button on the bottom

  1. Grant delegate and application permissions for the role User.ReadAll
  1. Setup SAML application in Enterprise applications / Manage / Single sign-on / SAML option
  1. Click in Edit button from Basic SAML Configuration panel
  1. Click in the Add Identifier and Add reply URL, then input:
    1. Cognito UserPool: us-east-1_E2cc5baXb
    2. SAML SSO Cognito URL: https://evolvemep.auth.us-east-1.amazoncognito.com/saml2/idpresponse
    3. Click on Save button
  1. Click the Edit button to change the attributes:
  1. It is recommended to clean up the Namespace field if this is not needed, then click on the Save button
  1. Copy and send this App Federation Metadata Url to the EvolveMep team, here is an example of this URL:
    https://login.microsoftonline.com/276ec0b5-dac8-4bd5-b0cd-e068bf17cb64/federationmetadata/2007-06/federationmetadata.xml?appid=110bfbf1-6e7c-40e1-a5f2-2e8528750786


How did we do?


Powered by HelpDocs (opens in a new tab)

Powered by HelpDocs (opens in a new tab)