Windows Single Sign On
Patriot supports integration with Microsoft Active Directory logins, allowing operators to sign in to the Patriot client application automatically.
Microsoft Entra Single Sign On is recommended for new single sign on deployments. Entra supports SSO for ICA as well as Desktop, and can be used alongside built-in operator logins.
Microsoft Windows Active Directory
Patriot supports integration with Microsoft Windows Active Directory (hereafter referred to as AD) that allows an automatic sign on to the Patriot client program using the operator's Windows user credentials. Program access and rights (see below) can be controlled within AD, thus making it easier to manage security access across an organisation. Security Groups are setup in AD for the various Patriot access levels required. These are then assigned to each operator's user in AD so that control of access is performed within AD rather than within Patriot.
Security Groups are setup in AD for the various Patriot access levels required. These are then assigned to each operator's user in AD. Thus control of access is performed within AD and not within Patriot. The specific rights that each group has is still configured within Patriot itself.
A system setting dictates if Single Sign On is enabled or not. Patriot will only support its own internal security model or single sign on, not both at the same time. So once single sign on is enabled, internal Patriot operators will no longer have access to the program.
Client Single Sign On Setup
Security Groups
One way to setup the security groups is to set them up in Patriot first. Note that the name of the Security Group is important and will be used to setup groups in AD also. As group names are unique in AD, you must use names that are not already used. It's suggested you prefix the name Patriot in front of all group names to ensure uniqueness. Setup the groups, and also configure the access rights for each group as required. You may use the existing Patriot security groups, or create new ones, as long as the name is not already in use in AD. Instructions for setting up Patriot groups are here.
Next create an Organisational Unit in AD to contain all the Patriot Security groups you require. This organisational unit should be reserved for Patriot use only, and must be named 'Patriot'.
Then create groups in this organisational unit for each Patriot security group. The name of the group in Patriot must match the name of the AD group exactly. If an AD group is used which doesn't exist in Patriot, it will be created in Patriot with no access rights.
Another approach is to set-up all the security groups you need in AD within the 'Patriot' Organisational Unit first and make a patriot administrator a member of all these groups. You will need to have at least one matching administrator group already set-up in Patriot with full rights (to allow full access to the administrator when they login for the first time). When the AD Patriot administrator subsequently logs into patriot all additional Patriot groups already set-up in AD will be automatically created within Patriot but by default will have no permissions - the patriot administrator can then proceed to grant permissions to the groups as desired.