Entra SSO - IdP. Frequent sign ins required

Hi All,

We’ve recently gone live with Epicor Kinetic (+ ECM, FP&A). We’ve set up Entra for SSO through the IdP.

Users (including myself) who use the Kinetic Client (and apps like DMT) need to manually sign in each time using password and MFA. The “remember my for XX days” is ignored.

Is there anything I can do to extend this time out? Sessions seem to be okay when done in the web browser.

FYI, we’re using the Kinetic Client and DMT initially for BOM imports etc.

Any ideas?

TIA

1 Like

We never figured this out. FWIW, we stopped short of ‘forcing’ Azure (meaning we still see the azure button at the bottom of idp login pane) so I wonder if you tried that and whether that helps with the client.

We would like to force the Entra/Azure login, however, we have some issues with UPN on some users so they’re using default Epicor IdP.

Thanks for your reply. I’ll post back if I try it. Have you tried any config file settings? We have not that I recall.

May I ask what config settings you’re referring to? Thank you

Azure related sysconfig settings. It’s been a while, but as I recall the only setting we changed was AuthenticationMode to IdP. Not sure if the others are needed for the client as we’re browser-only (except for DMT, Functions, ARP) so I havn’t tried. They may be for non-IdP Azure auth. :man_shrugging:

  <appSettings>
    <AuthenticationMode value="IdentityProvider" options="Windows|AzureAD|IdentityProvider|Token|Basic" />
     ...
    <!--Azure AD required authentication fields -->
    <!--Azure AD tenantID - DirectoryID from Azure AD Properties -->
    <AzureADDirectoryID value="" />
    <!--Azure AD Web Application ID - Application ID of registered web application -->
    <AzureADWebAppID value="" />
    <!--Azure AD Native Client Application ID - Application ID of registered native application -->
    <AzureADNativeClientAppID value="" />