Enterprise Single Sign-On Configuration for Email Alerts
Organization: Sedgwick Tenant ID: sedgwick Environment: PROD Base URL: https://scms.emailprioritization.com
Required Permissions Overview
Before proceeding with setup, review the permissions that Email Alerts requires to function properly. This will help you assess compatibility with your organization's security policies.
â ī¸ Important: Email Alerts operates entirely on behalf of individual users using delegated permissions. The application does not have or require application-level access to your organization's data.
Microsoft Graph API Permissions (Outlook Integration)
Email Alerts uses delegated permissions which allow the app to act on behalf of signed-in users. The app cannot access other users' data.
Permission
Purpose
Default Consent
offline_access
Maintain access to data (enables refresh tokens for continuous monitoring)
đ¤ User can consent
User.Read
Read user profile information (name, email)
đ¤ User can consent
Mail.Read
Read emails for sentiment analysis
đ¤ User can consent*
Mail.ReadWrite
Tag/categorize emails based on sentiment scores
đ¤ User can consent*
Mail.Send
Send reply emails on behalf of the user (optional)
đ¤ User can consent*
MailboxSettings.Read
Read mailbox settings and office hours (optional)
đ¤ User can consent
Team.ReadBasic.All
List Microsoft Teams for notifications (optional)
đ¤ User can consent
Channel.ReadBasic.All
List channels in Teams (optional)
đ¤ User can consent
Directory.Read.All
Read all directory data (users, groups, organizational structure)
đ Admin consent always required
Organizational Features:
The permission highlighted in yellow provides organizational insights but typically requires admin approval:
Directory.Read.All: Displays full organizational structure including supervisor/manager relationships, reporting structures, and group memberships in the admin panel
Note: The application will function normally without this admin-consent permission, but organizational structure features in the admin panel will be limited.
â ī¸ Important - Organization Consent Policies:
*While these delegated permissions typically allow user consent, many organizations override this default behavior for security reasons:
Restricted Policy: Organization may require admin consent for ALL applications
Mail Permissions: Many organizations specifically require admin approval for Mail.* permissions due to their sensitive nature
Publisher Verification: Unverified publishers may require admin consent regardless of permission type
Check your policy: Microsoft Entra ID â Enterprise applications â Consent and permissions â User consent settings
đĄ For Enterprise Deployments: We recommend having an administrator grant consent on behalf of all users during initial setup. This provides a smoother user experience and ensures consistent access across your organization.
Grant Admin Consent for Microsoft Graph
As an administrator, you can grant consent for all Microsoft Graph permissions on behalf of your entire organization. This eliminates the need for individual users to approve permissions.
â ī¸ Important: When prompted, you MUST check the box "Consent on behalf of your organization" before clicking Accept. If you don't check this box, consent will only be granted for your account, not the entire organization.
đ Note on Application Architecture:
Your SAML Enterprise Application handles user authentication (login). When users first add email accounts, Microsoft automatically creates a separate OAuth application (named "Email Alerts - [YourTenant]") in your Enterprise Applications list for Microsoft Graph API access. This automatic creation is normal and expected behavior for multi-tenant applications.
Role-Based Access Control (RBAC)
Once users are authenticated via SSO, their permissions within Email Alerts are determined by their assigned role:
Role
Key Permissions
Typical Users
Global Admin
Create global rules and templates
User management
Role assignment
System configuration
View all analytics
IT administrators, System owners
Regional Admin
Choose from allowed templates, view analytics
Configure integrations
Monitor system usage
Team leads, Managers
Restricted User (default for enterprise)
Cannot modify rules
View own emails/analytics
Apply approved templates only
Limited configuration options
General employees
Security Best Practices:
â All OAuth tokens are encrypted using AWS KMS
â Webhook payloads are validated with signatures
â Rate limiting prevents abuse (5 notifications/hour per user)
â No passwords are stored - only OAuth tokens
â Multi-tenant architecture ensures data isolation
â Regular security audits and penetration testing
Quick Start - SSO Configuration
â SAML Configuration Complete
Single Sign-On has been successfully configured for Sedgwick.
Configured From IP:143.109.113.144, 170.85.102.125
âšī¸ Configuration is Locked
For security reasons, SAML configuration cannot be changed once set. If you need to modify the configuration, please contact support.
SCIM User Provisioning
Automatically manage user accounts with SCIM 2.0. Use the same Enterprise Application for both SAML SSO and SCIM provisioning.
đĄ Single Application Setup
You'll configure SCIM provisioning in the same Enterprise Application used for SAML SSO. This ensures consistent group assignments and simplified management.
SCIM Base URL:
https://scms.emailprioritization.com/scim/v2
Secret Token:
Checking token status...
âšī¸ Authentication Required
You must be signed in as an administrator to generate SCIM tokens.
Note: Additional attributes may be shown. The most important ones for Email Alerts are userName, active, displayName, and emails.
The Source Object should be set to "User" and Target Object will be automatically set to "urn:ietf:params:scim:schemas:extension:enterprise:2.0:User"
Click Save
Note: Group provisioning is handled separately. Email Alerts uses group names for role mapping, not group provisioning.
Assign Users and Groups
Assign the groups to your Enterprise Application for automatic role assignment:
Go to Users and groups in your Enterprise Application
Click Add user/group
Create and assign these Microsoft Entra ID groups with EXACT names for automatic role mapping:
â ī¸ Important: Use these exact group names for automatic mapping:
Email Alerts-GlobalAdmins â Automatically maps to Global Admin role
Email Alerts-RegionalAdmins â Automatically maps to Regional Admin role
Email Alerts-Restricted â Automatically maps to Restricted User role
Note: Groups with these exact names will be automatically mapped when provisioned via SCIM.
Groups with different names will need manual mapping in the section below.
These same groups control both SSO access and SCIM provisioning
Users not in any assigned group will receive the default role configured for your tenant.
Start Provisioning
Go back to the Provisioning tab
Under Settings, toggle Provisioning Status to On
Click Save at the top of the page
Microsoft Entra ID will start an initial sync cycle (this may take a few minutes)
Monitor the Provisioning logs in the left menu for any errors
Users will be synchronized automatically based on your group assignments
â Testing Your Configuration
After starting provisioning:
Check the admin panel at /admin/users to see provisioned users
Verify user roles are correctly assigned based on group membership
Test user login via SAML SSO
Monitor provisioning logs in Azure Portal for any sync issues
Email Domain Policy
Users in your organization can only add email accounts from these domains:
sedgwick.com
Group to Role Mapping
Configure how Microsoft Entra ID groups map to Email Alerts roles. This determines user permissions based on their group membership.
âšī¸ How Group Mapping Works:
Users are assigned roles based on their Microsoft Entra ID group membership
If a user belongs to multiple groups, they receive the highest privilege role
Changes to group membership are reflected when users are provisioned or synced
âšī¸ Authentication Required
You must be signed in as an administrator to configure group mappings.
Enable real-time email alerts directly in Microsoft Teams. Users get notifications when angry emails are detected, helping teams respond quickly to customer issues.
â Automated Setup
The Azure Bot is automatically created and configured by Email Alerts. Just download the Teams app package below and upload it to your organization's Teams.
Step 1: Download & Upload Teams App
Download Custom Teams Manifest
Download a pre-configured Teams app package customized for Sedgwick:
You should be redirected to your identity provider (Microsoft Entra ID, Okta, etc.)
Sign in with your corporate credentials
After successful authentication, you'll be returned to Email Alerts dashboard
đĄ Tip: If you don't see the enterprise login page, make sure you're accessing the correct tenant subdomain URL (https://scms.emailprioritization.com), not the main Email Alerts domain.
Security Note: All authentication data is encrypted in transit and at rest.
Email Alerts never stores your identity provider passwords. We only receive and validate
SAML assertions from your IdP.