Upgrade to the latest version of Unite software for improved performance and a seamless product experience. Learn how to upgrade with our step-by-step guide.
Enabling Microsoft Single Single On for 3Shape Account
- Registration with Microsoft Account
- Customers with Azure Entra ID
- Customers with Private Microsoft Accounts
- Enabling Single Sign-On for Existing Users
- Customers with Azure Entra ID
- Customers with Private Microsoft Accounts
- Prerequisites for Customers with Azure Entra ID
- Your Policy is Set to "Do Not Allow User Consent"
- Your Policy is Set to "Allow User Consent for Apps from Verified Publishers, for Selected Permissions (Recommended)"
- Your Policy is Set to "Allow User Consent for Apps"
- Troubleshooting
- Enabling Single Sign-On for Existing Users
- Registration with Microsoft
Enabling Microsoft Single Single On for 3Shape Account
19/06/2024Registration with Microsoft Account
Customers with Azure Entra ID
- Ensure the prerequisites for Customers with Azure Entra ID are met (see Prerequisites for Customers with Azure Entra ID).
- Click "Sign in with Microsoft" button.
- Sign in with a desired Microsoft account.
- Accept requested permissions if the screen is present.
- Follow further instructions when you are redirected back to 3Shape Account.
Customers with Private Microsoft Accounts
- Click "Sign in with Microsoft" button.
- Sign in with a desired Microsoft account.
- Accept requested permissions.
- Follow further instructions when you are redirected back to 3Shape Account.
Enabling Single Sign-On for Existing Users
Customers with Azure Entra ID
- Ensure the prerequisites for Customers with Azure Entra ID are met (see Prerequisites for Customers with Azure Entra ID).
- Visit 3Shape Account Profile.
- Click "Sign in with Microsoft" button in Personal Settings.
- Enter the password for your 3Shape Account.
- Sign in with a desired Microsoft account.
- Accept requested permissions if the screen is present.
You will be redirected back to 3Shape Account profile and you will see a notification about successful pairing.
Customers with Private Microsoft Accounts
- Visit 3Shape Account Profile.
- Click "Sign in with Microsoft" button in Personal Settings.
- Enter the password for your 3Shape Account.
- Sign in with a desired Microsoft account.
- Accept requested permissions.
- You will be redirected back to 3Shape Account profile and you will see a notification about successful pairing.
Prerequisites for Customers with Azure Entra ID
As a prerequisite, ensure that you have enough privileges to create a new enterprise application. You need to be at least a Cloud Application Administrator.
- Go to enterprise applications -> Overview in Azure Portal.
- Click "Add new application."
- Search for "3Shape Account" application.
- Depending on how the enterprise application looks for you, some steps might vary.
- If the application has a "Create" button, click "Create" and proceed to step 10.
- If the application has a "Sign up with 3Shape account" button, click "Sign up with 3Shape account".
- You will be redirected to the 3Shape Account registration page. Click "Sign-in with Microsoft" button.
- Sign in with your Microsoft account that has at least Cloud Application Administrator role.
- You will be presented with the Permission request page.
- Accept the permissions (only your current user will be affected).
- Regardless of the result (whether the 3Shape account is created or you are presented with an error), proceed to step 10.
- Ensure you have 3Shape Account enterprise application installed.
Depending on your organizational setup for User Consent settings for Enterprise Applications, the next steps vary.
Your Policy is Set to "Do Not Allow User Consent"
- Go to 3Shape Account enterprise application.
- Go to Permission settings and click "Grant admin consent for your organization name."
- You will be redirected to a permission request window.
- Accept the permissions.
- Your organizational users can now register new 3Shape Account using their organizational Entra ID accounts. Users that have pre-existing accounts can now enable single sign-on (see Enabling Single Sign-On for Existing Users).
Your Policy is Set to "Allow User Consent for Apps from Verified Publishers, for Selected Permissions (Recommended)"
- Go to Enterprise Applications -> Consent and Permissions -> Permission classifications tab.
- If you have User.Read, offline_access, openid, profile, and email permissions enabled, users can create and pair accounts.
- If you don't have some of the permissions, add the missing ones.
- If your organization's policy does not allow adding missing permissions, then continue as if your policy is set to "Do not allow user consent."
- Individual users, upon their first login via 3Shape Account application, will be presented with a consent screen that they must accept to proceed with account creation/login.
Your Policy is Set to "Allow User Consent for Apps"
- Individual users, upon their first login via 3Shape Account application, will be presented with a consent screen that they must accept to proceed with account creation/login.
Troubleshooting
Enabling Single Sign-On for Existing Users
Users See Notification "We did not succeed to enable single sign-on"
Possible Reasons:
- The user did not accept required permissions during sign in to their Microsoft account.
- The user cannot proceed with Microsoft login due to missing permissions (applicable for Customers with Azure Entra ID only).
Solution:
Based on your organizational setting of Enterprise Application Consent Request settings, your users might experience different breakaway flows: Admin Consent Request is Enabled
A user logs in/registers a 3Shape Account using their Microsoft account but can't proceed and sees "Approval required."
- . Go to Enterprise Applications -> Admin Consent requests -> All.
- If 3Shape Account is there, approve the request and proceed to the next step.
- If there is no pending Admin Consent request for "3Shape Account," proceed to the Prerequisites for Customers with Azure Entra ID section.
A user logs in/registers a 3Shape Account using their Microsoft account but can't proceed and sees "Need admin approval."
- Ensure prerequisites are met (see Prerequisites for Customers with Azure Entra ID).
Admin Consent Request is Disabled
- The user logged in with a Microsoft account that has an email matching an already existing 3Shape Account.
- Solution: Follow the instructions in the section Enabling Single Sign-On for Existing Users.
Registration with Microsoft
Users See Notification "We did not succeed to enable single sign-on"
Possible Reasons:
- The user did not accept required permissions during sign in to their Microsoft account.
- The user cannot proceed with Microsoft login due to missing permissions (applicable for Customers with Azure Entra ID only).
Solution:
Based on your organizational setting of Enterprise Application Consent Request settings, your users might experience different breakaway flows: Admin Consent Request is Enabled
A user logs in/registers a 3Shape Account using their Microsoft account but can't proceed and sees "Approval required."
- Go to Enterprise Applications -> Admin Consent requests -> All.
- If 3Shape Account is there, approve the request and proceed to the next step
- If there is no pending Admin Consent request for "3Shape Account," proceed to the Prerequisites for Customers with Azure Entra ID section.
Admin Consent Request is Disabled
A user logs in/registers a 3Shape Account using their Microsoft account but can't proceed and sees "Need admin approval."
- Ensure prerequisites are met (see Prerequisites for Customers with Azure Entra ID).
End of Solution
- The user logged in with a Microsoft account that has an email matching an already existing 3Shape Account.
- Solution: Follow the instructions in the section Enabling Single Sign-On for Existing Users.
- Solution: Follow the instructions in the section Enabling Single Sign-On for Existing Users.