Configure and test Microsoft Entra SSO with Asana using a test user called B.Simon. For SSO to work, you need to establish a link relationship between a Microsoft Entra user and the related user in Asana.
To configure and test Microsoft Entra SSO with Asana, perform the following steps:
Browse to Identity > Applications > Enterprise applications > Asana application integration page, find the Manage section and select Single sign-on.
On the Select a Single sign-on method page, select SAML.
On the Set up Single Sign-On with SAML page, click the pencil icon for Basic SAML Configuration to edit the settings.
On the Basic SAML Configuration section, perform the following steps:
a. In the Identifier (Entity ID) text box, type the URL:
https://app.asana.com/
Bemærk
If you require a different value to the Identifier (Entity ID) please get in touch with us.
b. In the Reply URL (Assertion Consumer Service URL) text box, type the URL:
https://app.asana.com/-/saml/consume
c. In the Sign on URL text box, type the URL:
https://app.asana.com/a/<email_suffix>
Bemærk
If you own many email domains, feel free to use any one of them.
On the Set up Single Sign-On with SAML page, in the SAML Signing Certificate section, click Download to download the Certificate (Base64) from the given options as per your requirement and save it on your computer.
On the Set up Asana section, copy the appropriate URL(s) as per your requirement.
Create a Microsoft Entra test user
In this section, you'll create a test user called B.Simon.
Browse to Identity > Applications > Enterprise applications > Asana.
In the app's overview page, select Users and groups.
Select Add user/group, then select Users and groups in the Add Assignment dialog.
In the Users and groups dialog, select B.Simon from the Users list, then click the Select button at the bottom of the screen.
If you are expecting a role to be assigned to the users, you can select it from the Select a role dropdown. If no role has been set up for this app, you see "Default Access" role selected.
In the Add Assignment dialog, click the Assign button.
Configure Asana SSO
In a different browser window, sign on to your Asana application. To configure SSO in Asana, access the admin console by clicking on the avatar on the top right corner of the screen. Then, click on Admin Console.
Navigate to the Security tab. Then click on SAML Authentication.
Perform the following steps in the below page:
a. Click on Required for all members, except guest accounts.
b. Paste the sign-in URL that you into its sign-in page URL textbox.
c. Paste the Certificate (Base64) content that you into X.509 Certificate field.
d. Set the session duration for your members.
e. Click Save.
Bemærk
Go to Asana guide for setting up SSO if you need further assistance.
Create Asana test user
The objective of this section is to create a user called Britta Simon in Asana. Asana supports automatic user provisioning, which is by default enabled. You can find more details here on how to configure automatic user provisioning.
If you need to create user manually, please perform following steps:
In this section, you create a user called Britta Simon in Asana.
On Asana, go to the Teams section on the left panel. Click the plus sign button.
Type the email of the user like britta.simon@contoso.com in the text box and then select Invite.
Click Send Invite. The new user will receive an email into their email account. user will need to create and validate the account.
Test SSO
In this section, you test your Microsoft Entra single sign-on configuration with following options.
Click on Test this application, this will redirect to Asana Sign-on URL where you can initiate the login flow.
Go to Asana Sign-on URL directly and initiate the login flow from there.
You can use Microsoft My Apps. When you click the Asana tile in the My Apps, this will redirect to Asana Sign-on URL. For more information about the My Apps, see Introduction to the My Apps.
Discover how Microsoft Entra External ID can provide secure, seamless sign-in experiences for your consumers and business customers. Explore tenant creation, app registration, flow customization, and account security.