To enable Single Sign-On for your GSX 365 Usage account you need to first ensure you have met a few pre-requisites.
1. You need an Azure account configured for your company. If you do not have one, you can sign up for a free trial. You will not be charged extra by Microsoft or GSX 365 Usage for using Single Sign-On with your account.
2. You need Administrator access to the Domain in Azure Active Directory that you are using for Office 365.
3. You need an existing GSX 365 Usage account with Admin permissions.
Enabling Single Sign-On
To get started, log in to GSX 365 Usage Reporting as your Admin account and navigate to User Management in the left hand navigation menu.
These user accounts will be removed during the setup process, so make note of any users with access as well as any Role Based Access Restriction that exists on those accounts. They will need to be re-created once the setup is complete.
Now navigate to the Profile & Settings link in the left hand navigation menu and select the Single Sign-On tab.
Ensure you have met all the pre-requisite criteria and click the Enable Single Sign-On button.
This will redirect you to the Microsoft Sign In website where you will be asked to give consent to joining the GSX 365 Usage Application to your Azure Active Directory.
Once you have granted consent, you will be taken back to GSX 365 Usage Reporting.
Require user assignment in Azure Active Directory
Now that Single Sign-On is enabled, you need to ensure that User Assignment is required within Azure Active Directory.
If you do not do this, anyone in your organisation will be able to access Radar Reporting.
Firstly, log in to the Azure Management portal as an Administrator.
Choose the directory you are using for Office 365 and click the Enterprise Applications link in the left navigation menu.
Click All Applications and then select the Office 365 Reports one.
Navigate to Properties, change the User Assignment Required to Yes and click the Save button at the top of the screen.
Single Sign-On is now enabled for your account. You will now have to grant users access to Radar Reporting inside Azure Active Directory.