How to Integrate Azure AD With ProProfs Training Maker
Azure Active Directory (Azure AD), now Microsoft Entra ID, is Microsoft's identity management service. It allows organizations to control how users access apps and data.
When you connect Azure AD with ProProfs Training Maker, you create a centralized system where user identities, login permissions, and security policies are all managed from one place.
Here’s how Azure AD integration strengthens user management:
-
Single sign-on (SSO): Users log in to ProProfs using their Azure credentials. No need to remember or reset separate passwords.
-
Centralized control: Add, remove, or update user access in Azure, and changes automatically apply to ProProfs. No duplicate work.
-
Better security: Azure's authentication protocols, such as MFA (multifactor authentication), apply when users access ProProfs, keeping your training environment safer.
-
Seamless onboarding: New users can be assigned courses through group policies without manual setup inside ProProfs.
-
Compliance-ready: Managing access through a unified system helps meet internal IT security standards and audit requirements.
By integrating, you simplify administration, strengthen data security, and give users a smoother training experience.
In this article, you'll learn:
1. How to Integrate Azure Active Directory with ProProfs Training Maker
2. How to Assign Users to an App
3. How to Locate the Direct Access URL
How to Integrate Azure Active Directory with ProProfs Training Maker
Step 1:
-
Log in to your Azure AD account
-
Select Enterprise applications under Azure services.
Step 2:
-
Search ProProfs Training Maker.
-
When it appears, click it, and select "Set up Single sign-on."
Step 3: Copy the "Thumbprint" on a notepad. You'll require it shortly.
Step 4: Copy the "Azure AD Identifier" (only the part after https://sts.windows.net/). You'll require it shortly.
Step 5: Select "Users and groups" from the left-hand side menu.
Step 6: In your ProProfs Training Maker Classroom,
-
Identify the classroom you want to connect with Azure AD.
-
Select Edit from the three-dot menu, as seen in the screenshot below.
Step 7:
-
Click "Integrations."
-
Enable "Azure ADFS."
-
Paste the respective details you copied earlier in the space provided.
-
Click "Save."
How to Assign Users to an App
Step 1: In the Azure AD portal, select "Enterprise applications." Then find and select the application you want to configure.
Step 2: In the left navigation menu, select Users and Groups.
Step 3: Select the Add user button.
Step 4: On the Add Assignment pane, select Users and Groups.
Step 5: Select the user or group you want to assign to the application. You can also start typing the name of the user or group in the search box. You can choose multiple users and groups, and your selections will appear under Selected items.
Step 6: When finished, choose Select.
Step 7: On the Users and Groups pane, select one or more users or groups from the list and then choose the Select button at the bottom.
Step 8: If the application supports it, you can assign a role to the user or group. On the Add Assignment pane, choose Select Role. Then, on the Select Role pane, choose a position to apply to the selected users or groups and select OK at the bottom.
Step 9: On the Add Assignment pane, select the Assign button at the bottom.
* Object ID is used to identify the master user enabling the SSO. It is for our application purpose
* Users should be available in both TM and Azure.
* Make sure you are entering the correct value in the Training Maker.
For more information, click here.
How to Locate Direct Access URL
Step 1: Navigate to the Azure Active Directory service in the Azure Portal using https://aad.portal.azure.com.
Step 2: Now click "Enterprise Application" in the left navigation.
Step 3: Search for the application in the search bar on the right.
Step 4: Select the application to go to the application details.
Step 5: Now click Properties in the left navigation.
Step 6: The User Access URL link is on the right-side page. Copy it and provide it to the user. This will prevent users from visiting the My Apps page to access the app.
User Access URL link can directly take them to the application and do the SSO.
Best Practices for a Smooth Azure AD Integration
-
Keep user profiles clean: To avoid login errors, ensure users in Azure AD and ProProfs are synced accurately (matching emails).
-
Use group-based access: Assign users to security groups linked to ProProfs access, making permissions easier to manage at scale.
-
Monitor access logs: Check Azure AD sign-in logs periodically to identify any unauthorized access attempts.
-
Document thumbprint and identifier settings: Keep backup copies when configuring SSO to simplify troubleshooting later.
-
Share direct access links proactively: Send the User Access URL to new users to reduce confusion and support tickets.
FAQs
1. Do users need to exist in both Azure AD and ProProfs to use single sign-on (SSO)?
Yes. For SSO to work correctly, users must be created in both Azure AD and ProProfs Training Maker. Azure handles authentication, but ProProfs manages course enrollment and reporting, so syncing both sides is important.
2. What happens if I remove a user from Azure AD? Will their ProProfs account be deleted too?
No. Removing a user from Azure AD prevents future logins but does not automatically delete their ProProfs account. If you need to remove access and training records entirely, you must manually deactivate or delete the user in ProProfs.
3. Can I assign different ProProfs classrooms to different user groups in Azure AD?
ProProfs currently links classrooms manually, not dynamically based on Azure groups. You can manage access at the classroom level inside ProProfs after Azure SSO is set up, but automatic classroom assignment based on Azure groups is not available.