
Request SSO Authentication for a New Hosted Application:
Anyone wishing to have an application added into the Southern Connecticut State University (SCSU) MyApps Access Panel, and/or an application requiring new Single Sign On configuration, must submit the Application SSO Request Form below, to helpdesk@southernct.edu no later than 90 days prior to the anticipated publish date of the application. Approval of an application for inclusion in login.southernct.edu and/or federation with SCSU does NOT designate official approval by the BOR, nor SCSU IT.
SSO will allow an application to authenticate with SCSU Microsoft 365 accounts, utilizing the SAML or OAuth protocols and will require additional coordination and configuration to complete.
Fillable SSO Integration Request: PDF
All Single Sign On applications must go through an approval process:
Renewal of x509 Azure Identity Provider SAML Certificates:
All Single Sign On SAML applications have an associated Identity Provider (IdP) x509 SAML certificate configured that expires every three years. As such, all Single Sign On SAML applications must be renewed at least every three years. Failure to do so will result in your application no longer being functional for user authentication.
Applications that have been set up for SAML SSO with our SCSU Azure Identity Provider have been streamlined so that functional owners can now renew the associated IdP x509 SAML certificate, for their respective applications.
If you are a functional owner of an application that has been configured for SAML SSO, you will receive a notification from our SCSU Microsoft Azure Identity Provider when your IdP x509 SAML certificate is about to expire, via an email from “Microsoft Security” with an email address of “MSSecurity-noreply@microsoft.com”. The following is an example of what this will look like:
(Image of renew your application certificate action)
The first notification from Microsoft will be emailed to you 59 days prior to the certificate’s expiration date.
As functional owner, your next step is to ensure you are familiar with your application’s best practice to renew the associated Identity Provider (IdP) x509 SAML certificate, and to work with your vendor to update this certificate, prior to the expiration date.
These are some common questions to ask your service provider/vendor:
Once you are familiar with your application vendor’s IdP SAML certificate renewal practice, you can then follow Microsoft’s “Recommended action” to renew the certificate as per the email you received from Microsoft, as in the above screenshot example.
Please NOTE: All IdP SAML certificates will be automatically rolled over to a new active SAML certificate should their respective active SAML certificate expire on the expiration date.
If you run into any problems or need additional guidance, please submit a helpdesk ticket via: https://helpdesk.southernct.edu