Imprivata Web SSO — WS-Federation
Imprivata enables Web SSO integration with Imprivata Enterprise Access Management, WS-Federation and Entra ID.
In this topic, Microsoft 365 is the example of an Entra ID-registered application.
-
For information about integrating Imprivata Web SSO with any SAML 2.0-enabled app, see Imprivata Web SSO — SAML 2.0.
-
For information about integrating Imprivata Web SSO with any Open ID Connect-enabled app, see Imprivata Web SSO — OpenID Connect.
-
For information about profiling applications for Single Sign-On with the Application Profile Generator, see Single Sign-On.
This topic describes configuring the integration between Imprivata Enterprise Access Management as the Identity Provider (IdP) and Microsoft 365 as the Service Provider (SP).
How It Works
Imprivata Web SSO with WS-Federation extends Single Sign-On functionality to Entra ID-registered applications by using the WE-Federation protocol to communicate with Entra ID.
Imprivata Web SSO provides single sign-on and secure multi-factor authentication for web applications, using Entra ID's conditional access policies. Imprivata Web SSO provides an Identity Provider (IdP) web service, with which the WS-Federation-ready applications will integrate. This service in the cloud acts as a front end, with a secure bi-directional connection to your Imprivata appliances, which in turn access Entra ID. Imprivata Web SSO provides identity management, authentication, and policy enforcement to your WS-Federation applications.
By default Entra ID serves as the IdP itself, but in this configuration, Entra ID federates user authentication, redirecting all user authentication requests to Imprivata Enterprise Access Management (the IdP) using WS-Federation.
Imprivata Enterprise Access Management's IdP Admin service, exposes public REST API for EAM SSO administrative functions. This is the same service used for SAML and OIDC-based WebSSO with Imprivata Enterprise Access Management.
Your on-premises Microsoft Active Directory server provides user identity management for Windows workstations and your Imprivata enterprise. It is required to maintain the Microsoft hybrid Entra ID model.
Your Imprivata enterprise must be provisioned to Imprivata Cloud so it can establish connection to cloud services responsible for WS-Federation functionality. It also serves the Imprivata Admin Console web application.
The User Principal Name (UPN) on the on-premises AD must match the UPN on Microsoft Entra.
Imprivata Web SSO only supports Service Provider-initiated interactions. Identity Provider-initiated interactions, where the user points their browser to the IdP, are not supported.
Before You Begin
If your enterprise is already federated with Imprivata as the IdP with the SAML protocol, you must first "un-federate" Entra ID from Imprivata and then "re-federate" using the process outlined here.
When you federate again with Imprivata IdP with WS-Federation, Entra ID is in "Managed" mode, using a different set of Powershell commands.
You can determine if you are already federated in Entra ID with the following command in Powershell: GET -PreferredAuthenticationProtocol
against your Entra ID instance. This command should return the value <SAMLP>
if you are already federated.
Once you have un-federated from Imprivata as the IdP, set the flag for the new federation: <-Authentication Federated>
(see below).
For your administrator to be able to configure Web SSO as described here, the administrator must be licensed for SSO/AM.
All users must be enrolled with Imprivata ID on their mobile device before this integration is completed.
In Entra ID, turn off Passwordless/Passthrough before this integration. Otherwise, MS Authenticator will continue to be used for AuthN instead of Imprivata ID.
In Entra ID, make the change here: Security > Authentication Methods > Microsoft Authenticator > Authentication Mode
For more details, see Microsoft documentation: https://learn.microsoft.com/en-us/entra/identity/hybrid/connect/how-to-connect-pta

Validate WS-Federation integration settings on the Imprivata Admin Console:
Setting | Required / Optional | Imprivata Admin Console location |
---|---|---|
Imprivata OneSign 23.2 or later | Required | Help menu |
Imprivata enterprise is provisioned and connected to the cloud | Required | Gear menu > Cloud connection |
Entra ID-registered application such as Microsoft 365 is added and enabled in Imprivata Admin Console. This profile is for Entra ID and supports all Entra ID-registered apps. | Required | Applications > Single sign-on application profiles |
Entra ID-registered application such as Microsoft 365 is deployed to selected set of users | Required | Applications > Single sign-on application profiles |
User policies are assigned to Web SSO workflow | Optional; required for multi-factor authentication | Users > Workflow policy |
Honor Entra ID conditional access policies — selected | Required | Users > Workflow policy |
Cloud Connection
Imprivata Services will enter the Enterprise ID and one-time cloud provisioning code required to establish trust between your Imprivata enterprise and the Imprivata cloud:
- If you're not on the Cloud Connection page already: In the Imprivata Admin Console, click the gear icon > Cloud connection.
- Services will enter your Enterprise ID and cloud provisioning code.
- Click Establish trust.
The cloud connection must be established by Imprivata Services.
Cloud Connection Status
You can review the status of your enterprise's connection to the Imprivata cloud at any time. Status notifications are displayed on the Imprivata Admin Console, and the cloud connection status of every appliance at every site is also available:
-
In the Imprivata Admin Console, go to the gear icon > Cloud connection.
-
Every appliance host is listed with its status. If there are problems with a connection, recommendations for resolving the problem are displayed here.

If you have already set up an Entra ID device, skip this section.
-
Deploy a virtual machine and login as an administrator.
-
Go to Windows Settings > Accounts > Access work or school
-
Select Connected to ... AD domain and click Disconnect. You may need to provide credentials to complete this action.
-
Restart Windows.
-
Launch the VM again and login as a local administrator.
-
Go to Windows Settings > Accounts > Access work or school again
-
Click Connect
-
In the Set up a work or school account window, select Join this device to Entra Active Directory
-
Sign in with the user's Entra ID credentials. On-premises sync must be enabled.
The device will appear in the list of devices on https://portal.azure.com/
with the join type Azure AD joined.
To login to the Entra ID joined device:
prepend AzureAD\
to the username: for example AzureAD\test1@impr40.com
or
no prefix: test1@impr40.com

If you have already set up a hybrid joined device, skip this section.
-
Deploy a virtual machine and login as an administrator.
-
Go to Windows Settings > Accounts > Access work or school
-
Select Connected to ... AD domain and click Disconnect. You may need to provide credentials to complete this action.
-
Restart Windows.
-
Launch the VM again and login as a local administrator.
-
Go to Windows Settings > Accounts > Access work or school again
-
Click Connect
-
Go to Windows Settings > Ethernet > Change adapter options
-
In the Network Connections window, right-click on Ethernet0 > Properties
-
Select Internet Protocol Version 4 (TCP/IPv4) and click Properties
-
In the Internet Protocol Version 4 (TCP/IPv4) window, click Advanced...
-
In the Advanced TCP/IP Settings window > DNS tab, click Add...
-
Enter the IP address of the domain controller and click Add.
-
In the Advanced TCP/IP Settings window, move this server address to the top of the order. Click OK.
-
Go to Windows Settings > Accounts > Access work or school again
-
Click Connect
-
In the Set up a work or school account window, select Join this device to a local Active Directory domain
-
In the Join a domain window, provide the domain name and click Next.
-
In the Add an account window, enter the user credentials and click Next.
The device will appear in the list of devices on
https://portal.azure.com/
with the join type Hybrid Azure AD joined.
Microsoft Entra Connect
Microsoft Entra Connect (formerly Azure AD Connect) is required for Ws-Fed integration with Imprivata. Instructions for Microsoft Entra Connect are found online in the Microsoft Learn documentation.
Add Application Using WS-Federation
Unlike other applications that require an application profile per app, in this scenario, you only create one application profile per domain, connected with Entra ID.
Only the superadmin role is able to configure Web SSO application profiles:
-
In the Imprivata Admin Console, go to Applications > Single sign-on application profiles.
All Single sign-on application profiles, including conventional Imprivata APG profiles, Mobile app profiles, SAML application profiles, and OpenID Connect application profiles, are all managed from this page.
-
Click Add App Profile > Application using WS-Federation. The Add application using WS-Federation page opens.
-
Give the application profile a name. This name is only visible to administrators.
If you want a different name for your users to see when they log in, Give the application a user-friendly name.
-
In the Redirect URI field, enter, as an example,
https://login.microsoftonline.com/login.srf
-
Click Save.
A new application profile is created. The Imprivata IdP Ws Federation metadata window will open. Your Microsoft 365 enterprise requires this information to complete the integration. You can copy this information now, or return to this application profile at any time to acquire it.
Set IdP Metadata with Microsoft Entra ID
Set the IdP metadata for this configuration with Microsoft Entra ID. All five URL values from the IdP metadata, and the IdP certificate are entered here:
-
In PowerShell, type the following command to install the necessary modules:
Install-Module -Name Microsoft.Graph
This command only needs to be executed once.
-
Enter this command next:
Connect-MgGraph -Scopes "Domain.ReadWrite.All", "Directory.AccessAsUser.All"
-
Enter your administrator credential for your Microsoft 365 tenant when prompted, and accept prompt for permissions.
-
If your domain isnot already federated, enter the following.
New-MgDomainFederationConfiguration
-DomainId <Domain name>
-ActiveSignInUri <Active URL from IdP metadata >
-IssuerUri <Issuer URL from IdP metadata>
-MetadataExchangeUri <Metadata URL from IdP metadata>
-PassiveSignInUri <Passive URL from IdP metadata>
-SignOutUri <Logoff URL from IdP metadata>
-SigningCertificate <Certificate data>
-FederatedIdpMfaBehavior "enforceMfaByFederatedIdp"
-PreferredAuthenticationProtocol wsFed | Format-List
CAUTION:The configuration command must not contain new lines/line breaks.
Remove all spaces from the certificate text.
-
If your domain is already federated, enter the following:
Get-MgDomainFederationConfiguration -DomainId <Domain name> | Format-List
Copy the ID of federation configuration.
Update-MgDomainFederationConfiguration
-DomainId <Domain name>
-InternalDomainFederationId <ID copied above>
-ActiveSignInUri <Active URL from IdP metadata>
-IssuerUri <Issuer URL from IdP metadata>
-MetadataExchangeUri <Metadata URL from IdP metadata>
-PassiveSignInUri <Passive URL from IdP metadata>
-SignOutUri <Logoff URL from IdP metadata>
-SigningCertificate <Certificate data>
-FederatedIdpMfaBehavior "enforceMfaByFederatedIdp"
-PreferredAuthenticationProtocol wsFed | Format-List
CAUTION:The configuration command must not contain new lines/line breaks.
Remove all spaces from the certificate text.
-
Check your work with the command:
Get-MgDomainFederationConfiguration -DomainId <Domain name> | Format-List
Rolling Back to Managed Mode
The rollback procedure to switch back to Managed mode, if necessary:
Update-MgDomain -DomainId <Domain name> -AuthenticationType "Managed"
Updating Certificate Data
When the certificate data needs to be updated (for example, when the certificate is expired):
Get-MgDomainFederationConfiguration -DomainId <Domain name> | Format-List
Copy the ID of federation configuration.
Update-MgDomainFederationConfiguration
-DomainId <Domain name>
-InternalDomainFederationId <ID copied above>
-SigningCertificate <Certificate data>
IT Pilot — Deploy to Select Users
Imprivata Web SSO application profiles offer flexible deployment options.
Deploy your profile to select users for testing:
-
In the Imprivata Admin Console, go to Applications > Single sign-on application profiles, find your App Profile, and click Not Deployed.
-
Click Deploy This Application?
-
Un-check Deploy to All Users and Groups.
-
Check the domain your test users are located in.
-
Check These OUs, groups and users
-
Specify your test users.
-
Click Save.
-
On the list of application profiles, check the box next to the profile and click Deploy.
Deploy To Users and Groups
Imprivata Web SSO application profiles offer flexible deployment options.
Deploy your profile to specific OUs, users, and groups as needed:
- In the Imprivata Admin Console, go to Applications > Single sign-on application profiles, find your App Profile, and click Not Deployed or Not Deployed.
- Check Deploy This Application.
- You can Deploy to All Users and Groups, or uncheck this option and deploy to select OUs, users, and groups.
- Check the domain your users are located in.
- Select For All Users (in this domain) or check These OUs, groups and users
- Select specific OUs, groups, and users as needed.
- Click Save.
- On the list of application profiles, check the box next to the profile and click Deploy.
For complete details, see Deploying Application Profiles.
All Imprivata users synced to the same domain in Active Directory as the Service Provider or Relying Party users, who are licensed for Single Sign On with Imprivata, will immediately be able to log into the Web SSO app using their username and password authenticated by Imprivata Web SSO.
When the workstation has the Imprivata agent online and the user is already logged into the workstation, the user will not be prompted for their credentials.
For complete Web SSO workflow details, see Expected Endpoint Workflows.
Microsoft recommends 24 hours for federation to propagate to all of its servers. This is relative to the number of servers, not the number of users. Deploy at the beginning of a weekend or when the load on Microsoft servers is lighter. If you're replacing an existing federated domain, propagation typically only takes 30 minutes.
Expected Endpoint Workflows
The expected Imprivata Web SSO workflow has the following variations:
Imprivata Agent Online
-
The user logs into desktop with Imprivata Enterprise Access Management.
-
The user provides the URL for an app enabled for Imprivata Web SSO.
-
The app opens. The user does not need to log into it manually.
Subsequent apps are automatically authenticated within the same browser and the same session.
If the user closes an app without logging out of the app, he can return to the app during the same session without logging in again.
Imprivata Agent Not Present or Unavailable
-
The user provides the URL for an app enabled for Imprivata Web SSO.
-
The user is prompted to log in:
- If the user is included in a user policy associated with the Imprivata Web SSO workflow, he will be prompted to complete the Log In workflow.
- If the user is not included in a user policy associated with the Imprivata Web SSO workflow, he will be prompted to authenticate with username and password.
-
The app opens.
Subsequent apps are automatically authenticated within the same browser and the same session.
If the user closes an app without logging out of the app, he can return to the app during the same session without logging in again.
Imprivata Web SSO on an Unsupported Browser
The expected Imprivata Web SSO workflow on an unsupported browser is the same as when the Imprivata agent is not present or unavailable:
-
The user provides the URL for an app enabled for Imprivata Web SSO.
-
The user is prompted to log in:
- If the user is included in a user policy associated with the Imprivata Web SSO workflow, he will be prompted to complete the Log In workflow.
- If the user is not included in a user policy associated with the Imprivata Web SSO workflow, he will be prompted to authenticate with username and password.
-
The app opens.
Subsequent apps are automatically authenticated within the same browser and the same session.
If the user closes an app without logging out of the app, he can return to the app during the same session without logging in again.
For complete details on supported browsers, see Imprivata Enterprise Access Management Supported Components
When Another User Logs In
When a subsequent user logs into a workstation, the Imprivata agent terminates the IdP session of the previous user.
Imprivata Web SSO cannot terminate user sessions:
-
In browsers other than Microsoft Edge or Google Chrome;
-
On workstations where the Imprivata agent is not present or unavailable;
-
For applications not enabled for Imprivata Web SSO;
Turn off persistent cookies for Relying Parties; this prevents a user from accessing another user's session after a Fast User Switch.
Manually log out of applications where Imprivata Web SSO cannot terminate the user session;
Close browser windows.
Optional — Web App Login Configuration
Configure the appearance of the web login application screens with the logo and color of your enterprise, and set a custom session log out value:
-
In the Imprivata Admin Console, go to the gear icon > Web app login configuration
- Select a background color for the login screen (hexidecimal value);
- Upload a PNG, GIF, or JPG logo (200 x 150 pixels, 250 KB max)
- User sessions are logged out after 2 hours by default. Turn off this automatic logout, or select a value between 30 minutes and 4 days.
- Click Save.
Troubleshooting
Verify proper integration of Imprivata Web SSO (IdP) with the Relying Party (RP).
-
Imprivata IdP configuration (accessed through Imprivata Admin Console);
-
Relying Party SSO configuration (Relying Party administration)
-
Endpoint (device from which the user accesses the Relying Party application).

Validate endpoint configuration:
Setting | Value |
---|---|
Endpoint is able to reach RP site | Check connection to RP host |
Endpoint has Internet connection and can reach IdP site |
Open in browser: |
Browser supports/allows cookies |

Validate configuration for an endpoint with an Imprivata agent:
Setting | Location/Value |
---|---|
Imprivata 23.2 or later agent is installed | Agent icon in Windows system tray |
Imprivata agent is connected and logged in | Agent icon in Windows system tray |
Single Sign On is enabled | Agent icon in Windows system tray |
User uses supported browser | Google Chrome and Microsoft Edge |
Imprivata browser extension is enabled | Google Chrome and Microsoft Edge |
Replacing Expiring Certificates
The IdP certificate for your Imprivata enterprise expires two years after it is enabled. You will receive an alert on the Imprivata Admin Console beginning 60 days before it expires.