Enable Identity Provider (IdP)-Initiated SSO for Microsoft Entra ID in PRTG Hosted Monitor
As an IT Operations Manager, I want my team members to be able to access PRTG directly from our Microsoft My Apps portal so that they can quickly reach our monitoring tools without remembering specific URLs.
Current Behavior (SP-initiated only):
The SSO integration only supports Service Provider (SP)-initiated login. A user must first navigate to their specific PRTG instance URL (e.g., my-company.my-prtg.com), enter their email address to trigger the SSO flow, and only then are they redirected to Microsoft for authentication. This is a multi-step process that requires users to remember the specific PRTG URL.
Desired Behavior (IdP-initiated):
A user should be able to log into their central Microsoft My Apps portal (myapps.microsoft.com), click on the PRTG application tile, and be automatically and seamlessly logged into their PRTG instance.
Why this is important:
IdP-initiated login is a standard feature for modern enterprise SaaS applications. It significantly improves the user experience by providing a single, centralized place for users to access all their corporate applications. This reduces friction, eliminates the need to bookmark specific login pages, and aligns with modern security practices of managing access through a central identity provider.
Technical Implementation:
This would require PRTG Hosted Monitor to provide a dedicated "Sign-on URL" that can be configured in the Microsoft Entra Enterprise Application settings to correctly receive and process IdP-initiated SAML or OIDC assertions.