Setting Up Single Sign-On (SSO) for InTime
Contents
Introduction
RSM InTime supports Single Sign-On (SSO) configuration, enabling selected users or user groups to authenticate using their identity provider credentials.
While InTime is compatible with various providers, Microsoft Azure is the most commonly used; therefore, this guide focuses on Azure-specific configuration.
Note: Although users must log into both RSM InTime and InPay separately, most users access InPay directly through InTime
Step 1 - Register an Application in Azure
The layout shown in the Azure screenshots may differ slightly from your own portal.
Log in to your Azure portal and navigate to Azure Active Directory.
Select App registrations.
Click New registration.
On the Register an application page, update the following fields:
Name: Enter an easy to reference name (e.g. “RSM SSO”)
Redirect URI
Set Platform to Web.
Enter the URI following format https://<yourInTimeDomain>/openid/auth
This must match the redirect address shown in InTime > Settings > Security Settings : IDENTITY PROVIDER section.
Your completed application page should look similar to the screenshot provided.
Click Register.
Step 2 - Create a Secret in Azure
Now that your InTime Azure application has been created, you must generate a secret. This will allow InTime to authenticate against your Azure application.
To create a secret:
In the application menu, click Certificates & secrets (left-hand navigation).
Click New Client Secret.
Enter a Description and select the appropriate Expiration option.
Click Add
Copy the Value of the secret (not the ID). You will need this to configure InTime later.
Step 3 - Enable ID Tokens in Azure
To allow Azure to issue ID tokens, update your app configuration:
Click Authentication.
Navigate to the Implicit grant and hybrid flows section.
Tick the box labelled ID tokens.
Click Save
Step 4 - Verify API Permissions in Azure
Before proceeding to configure InTime, ensure your Azure application has the correct API permissions assigned.
In your Azure application, navigate to API permissions (left-hand navigation).
Confirm the following permission is listed:
Microsoft Graph >
openid
If not already present:
Click Add a permission.
Select Microsoft Graph > Delegated permissions.
Search for and select
openid
, then click Add permissions.
Click Grant admin consent if required by your organisation’s policies.
Verifying these permissions ensures that Azure can issue the necessary tokens for SSO authentication.
Step 5 - Configuring InTime
We recommend that you are logged in to InTime and your Azure portal (or Identify provider) simultaneously for the next step.
Within InTime navigate to:
Settings > Security Settings
If the Settings menu is unavailable, contact your system administrator to ensure your user role has appropriate access.
Scroll down to the Identity Provider section.
Populate the following fields:
a. Within your newly created Azure application, click on Endpoints.
b. Azure will provide a list of endpoints relating to your application. Copy the value in the field OpenID Connect metadata document.
c. Paste the OpenID Connect metadata document in to the Metadata URL field or the IDENTIFY PROVIDER section of InTime
d. Click Load Configuration to auto populate the additional endpoint settings.
e. Populate openid email in to the Requested Scopes field.
f. Populate your Azure application client ID in to the Client ID field.
The application client ID as displayed in Azure
Populate within InTime
Populate the secret created in Step 2 in to the Client Secret field within InTime
The IDENTITY PROVIDER section in InTime should now resemble the example screenshot provided.
Click Save
Step 6 - Test Single Sign On
To verify SSO is configured correctly:
Attempt to log in to InTime using your Azure credentials.
Ensure the user:
Navigates to the correct InTime login URL.
Logs in using their email address, not their InTime username.
Troubleshooting
If users are unable to authenticate using Single Sign-On, try the following checks (click to expand):
If, after performing all the troubleshooting steps above, users are still unable to log in using Single Sign-On, we recommend the following:
Delete the existing Azure application and reconfigure it from scratch, carefully following each step of this guide.
This ensures any misconfigured values, expired secrets, or overlooked settings are fully reset and correctly applied.