Setting up Microsoft/Entra ID Single Sign On (SSO) with HYPE Boards is very straightforward and typically requires none to minimal input from your Microsoft 365 administrators. Please refer to Setting up Microsoft SSO with HYPE Boards for instructions on setting it up.
However, some organizations might have set Microsoft 365 to not allow external apps by default, or have additional IT policies in place preventing the intended use of the application.
So if your users are not allowed to log in to HYPE Boards with their Microsoft accounts, or are experiencing other related issues, it is highly likely that your current Azure Active Directory settings are the reason. We've outlined the most common causes for these issues below so that you can try to identify the source of the issue.
Most common causes
Here's a breakdown of the most common challenges you may come across:
The app is lacking admin consent
Depending on your IT policies, external applications might require an admin to grant access to them before users are able to start using them. You can check the status of your permissions and then fix the issue by following the steps below.
This issue might be shown in the form of this type of error showing when a user tries to log into HYPE Boards:
TIP: A Microsoft 365 admin can grant admin consent for the rest of the organization to log into HYPE Boards simply by logging into HYPE Boards with their own Microsoft account. If this doesn't work, then please follow the steps below.
Go to the Azure Active Directory admin center and choose the "Enterprise applications" tab
Choose "Viima" from the list of all applications (if you don't yet see Viima, click "New application" and search for Viima from the app gallery, then add it)
Choose the "Permissions" tab
Check if the app has an active "admin consent", such as the one in the screenshot below.
If the application doesn't have the appropriate permissions, click here and proceed to authorize the app.
External applications are disabled and Viima has not been added as an enterprise application
If your organization has chosen to block access to external applications by default, you have to explicitly add Viima as an "enterprise application" in order to allow users to log in with their Office365/AzureAD accounts. You can do this by following the steps below:
Go to the Azure Active Directory admin center and choose the "Enterprise applications" tab
Click "New application"
Search for "Viima" from the App Gallery
Choose Viima, then click "Add" from the pane that opens
You can then proceed to check the application properties to make sure your users are allowed to log in.
Application properties prevent logging in
The application settings for Viima in your Azure AD might prevent your users from logging in. You can fix the issue by following the steps below.
Go to the Azure Active Directory admin center and choose the "Enterprise applications" tab
Choose "Viima" from the list of all applications (if you don't yet see Viima, click "New application" and search for Viima from the app gallery, then add it)
Choose the "Properties" tab
Make sure the settings allow your users to log in and that the app is visible for them, and also that user assignment is not required. Should you wish to require user assignment, you have to manually make sure each user is assigned to the application from the user's tab, otherwise they won't be able to access Viima.
Integrated (external) apps are disabled
In some cases, organizations have turned off access to external apps. This can prevent users from accessing Viima along with other external apps unless application settings are otherwise correctly configured. If it's ok for you to use integrated apps, this is easy to fix by following the steps below.
Navigate to Microsoft 365 Admin Portal.
From the "Settings" panel, open "Services & add-ins." Then click "Integrated Apps".
Make sure that Integrated Apps are enabled. Remember to save your changes.
Entra ID Conditional access policies or firewall block access
Some Azure Active Directory plans allow organizations to create conditional access policies for their applications and users. These can be used, for example, to prevent access to an application from outside the corporate network, for users from certain user groups. Such policies can be useful, but if configured incorrectly, block access to HYPE Boards from some or all of your users.
β
If you're experiencing issues from some users and not from others, you might want to check if your conditional access policies or your corporate firewall have rules in place for preventing access to certain types of resources under some circumstances. To modify your Entra ID conditional access policies, follow the steps below:
Go to the Azure Active Directory admin center and choose the "Enterprise applications" tab
Choose "Viima" from the list of all applications (if you don't yet see Viima, click "New application" and search for Viima from the app gallery, then add it)
Choose the "Conditional access" tab
Adjust your conditional access policies to allow access to Viima.
If you've checked and/or fixed all of the above issues, you should now be able to authorize HYPE Boards to use Microsoft credentials and log in.
Should you still face challenges with the integration, please contact our support.