How to configure SSO for GoToMeeting
ADSelfService Plus supports AD-based SSO for GoToMeeting and many other cloud applications such as Salesforce, Google Workspace, and Cybozu. With GoToMeeting SSO enabled, users only have to log in once using their AD domain credentials. After logging in, users can securely access their GoToMeeting account without having to enter their username and password again.
ADSelfService Plus supports the service-provider-initiated SSO method for GoToMeeting. Through this method, when users access GoToMeeting via a URL or bookmark, they are routed to the login page of ADSelfService Plus. After they log in, they will be redirected and logged in to GoToMeeting automatically.
Service Provider (SP)-initiated SSO is supported by ADSelfService Plus for GoToMeeting.
SP-initiated SSO for GoToMeeting: When users access GoToMeeting via a URL or bookmark, they are routed to the login page of ADSelfService Plus. After they log in, they will be redirected and logged into GoToMeeting automatically.
Benefits of SSO using ADSelfService Plus
- One-click access to enterprise applications: When SSO is enabled, users simply need to log in to ADSelfService Plus, which acts as the identity provider. Once logged in, users are presented with a dashboard that lists every cloud application they have access to.
- Secure SSO with MFA: ADSelfService Plus' MFA feature can be implemented to protect SSO through advanced authentication methods such as biometrics, time-based one-time passcodes, and QR-code based authentication.
- Policy-based access control: Control who accesses which cloud applications by creating policies based on Active Directory OUs and groups. You can create multiple policies and restrict access to critical business applications to only users who need them.
Follow the step-by-step guide given below to configure SSO for GoToMeeting
Before you begin
Download and install ADSelfService Plus if you haven’t already.
Configuring your Active Directory domain in ADSelfService Plus
ADSelfService Plus utilizes the existing AD domain credentials for authenticating users during SSO. This makes the configuration of AD domains in ADSelfService Plus necessary before enabling SSO for GoToMeeting.
By default, ADSelfService Plus will try to add all the domains that it can discover in the network. If the required domains are automatically added, skip to step 9; otherwise, follow the steps below and add the domains manually.
- Log in to ADSelfService Plus web console using admin credentials.
- Click the Domain Settings link located on the top-right corner of the page.
- An Add Domain Details window will appear.
- In the Domain Name field, enter the name of the domain you want to add.
- In the Add Domain Controllers field, click Discover. ADSelfService Plus will try to automatically discover the domain controllers associated with the specified domain.
- If the domain controllers are not auto-discovered automatically, enter the domain controller name in the field provided, and click Add.
- You can leave the authentication fields empty if you're not going to use the end user self-service features of ADSelfService Plus.
- In Add Domain Details window, click Add.
Getting the SSO/SAML Details from ADSelfService Plus
- Navigate to Configuration → Self-Service → Password Sync/Single Sign On.
- In the dashboard which displays the list of applications supported by ADSelfService Plus, click GoToMeeting.
- Click Download SSO Certificate located on the top-right corner of the page.
- In the pop-up that appears, copy the Login URL and Logout URL.
- Click Download SSO Certificate to download the PEM file.
Configuring SSO settings in GoToMeeting
- Log in to GoToMeeting with administrator credentials.
- Navigate to the Identity provider tab and select Manual from the drop-down menu.
- For the Sign-in page url, paste the Login URL from step 12.
- For the Sign-out page url (optional), paste the Logout URL from step 12.
- In the Identity Provider Entity ID field, enter the Login URL from step 12.
- Open the PEM file from step 13 in a text editor (like Notepad), and copy the entire contents of the file (including the -----BEGIN CERTIFICATE----- and -----END CERTIFICATE----- lines). Paste the certificate file text in the Verification Certificate field.
- Click Save.
Adding your GoToMeeting domain in ADSelfService Plus and enabling SSO
- Navigate to ADSelfService Plus’ GoToMeeting configuration page.
- In the Domain Name field, enter the name of the domain for which you have enabled SSO.
- In the Display Name field, provide an appropriate display name.
- Provide an appropriate description in the Description field.
- In the Available Policies field, select the policies for which SSO must be enabled.
Note: ADSelfService Plus allows you to create OU and group-based policies for your AD domains. To create a policy, go to Configuration → Self-Service → Policy Configuration → Add New Policy. Click Select OUs/Groups, and make the selection based on your requirements. You need to select at least one self-service feature.
- Click Save.
That’s it! Now users can log into their Citrix ShareFile account automatically using single sign-on.
Secure access to any SAML enabled enterprise applications with AD credential.
Free Active Directory users from attending lengthy help desk calls by allowing them to self-service their password resets/ account unlock tasks. Hassle-free password change for Active Directory users with ADSelfService Plus ‘Change Password’ console.
Get seamless one-click access to 100+ cloud applications. With enterprise single sign-on, users can access all their cloud applications with their Active Directory credentials. Thanks to ADSelfService Plus!
Intimate Active Directory users of their impending password/account expiry by mailing them these password/account expiry notifications.
Synchronize Windows Active Directory user password/account changes across multiple systems, automatically, including Office 365, G Suite, IBM iSeries and more.
Ensure strong user passwords that resist various hacking threats with ADSelfService Plus by enforcing Active Directory users to adhere to compliant passwords via displaying password complexity requirements.
Portal that lets Active Directory users update their latest information and a quick search facility to scout for information about peers by using search keys, like contact number, of the personality being searched.