LogMeIn support sites no longer support Microsoft's Internet Explorer (IE) browser. Please use a supported browser to ensure all features perform as they should (Chrome / FireFox / Edge).

The GoTo support site no longer supports Safari 15. Please upgrade your browser to Safari 16 (or newer) or switch to a supported browser such as Google Chrome, Mozilla Firefox, or Microsoft Edge.

Maintain your IT infrastructure with powerful RMM software. Discover LogMeIn Central.

We are currently experiencing an unplanned outage for this product. View Service Status
  • Support
  • Products

    Explore support by product

    GoTo Connect

    All-in-one phone, meeting and messaging software

    GoTo Meeting

    Video and audio meeting software

    GoTo Webinar

    All-in-one webinar and virtual events software

    GoTo Room

    Conference room hardware

    GoTo Training

    Online training software

    OpenVoice

    Audio conferencing software

    Grasshopper

    Lightweight virtual phone system

    join.me

    Video conferencing software

    LogMeIn Resolve

    IT management & support

    LogMeIn Resolve MDM

    Mobile device management

    LogMeIn Pro

    Remote device access

    LogMeIn Central

    Remote monitoring & management

    LogMeIn Rescue

    Remote IT support

    GoToMyPC

    Remote desktop access

    GoToAssist

    Remote support software

    Hamachi

    Hosted VPN service

    RemotelyAnywhere

    On-prem remote access solution
  • Community
  • Trainings
  • Service Status
  • LogMeIn Returns as GoTo's IT Portfolio Brand

    LogMeIn is back as the name behind our IT products.

    Read the full announcement.
    Try the improved My Cases portal

    Easily manage your ticket, track its status, contact us from an existing case, and more.

    Sign in to try
  • Language selector icon Language selector icon
    • English
    • français
    • italiano
    • Deutsch
    • español
    • português
    • Nederlands
  • Contact Support
  • Service Status
  • User Avatar User Avatar
    • Support
    • Contact Support
    • Browse Products
    • Service Status
    • Community
    • Trainings
    • Sign in
    • User Avatar
    • My Account
    • Personal Info
    • Sign In & Security
    • My Cases
    • Billing Center
    • https://link.goto.com/myaccount-billing
    • My GoTo Connect
    • My Meetings
    • My Webinars
    • My Trainings
    • My Conferences
    • My Resolutions
    • My Mobile Devices
    • My Sessions
    • My Sessions
    • My Incidents
    • Sign out
  • Explore Features
  • Integrations
product logo
Back button image Back
Back button image
product logo

Using Azure Active Directory with LogMeIn Central

Integrate Azure Active Directory with LogMeIn Central for additional authentication.

Prerequisites:
  • An Azure Active Directory Premium subscription.
  • An active LogMeIn Central subscription.
  • When you have a login policy enabled, you must set it up as "Standard". Single Sign On does not work with "Strong" password policy. See Set a password strength requirement in LogMeIn Central.
Important: You can log in with Single Sign On on the website only. The Client App does not support Single Sign On login.
Note: For more information on using SAML with Azure Active Directory, see Microsoft's support site.

Configure your Azure Active Directory Account

  1. Log in to https://portal.azure.com.
  2. Navigate to Azure Active Directory > Enterprise Applications > New application.

    Result: The Add an application menu is displayed.

  3. Select Non-gallery application.

    Result: The Add your own application menu is displayed.

  4. Give the new application a name and select Add.
  5. Select Single sign-on > SAML.
  6. Under Basic SAML Configuration, set the following values:

    Result:

    Identifier (Entity ID) https://accounts.logme.in
    Reply URL
    Add the following line as Reply URL:
    https://accounts.logme.in/federated/saml2.aspx?returnurl=https%3A%2F%2Fsecure.logmein.com%2Ffederated%2Floginsso.aspx
    If you receive an error, use the following Reply URL:
    https://accounts.logme.in/federated/saml2.aspx

  7. Select Save.
  8. Under SAML Signing Certificate, download the Certificate (Raw) and Federated Metadata XML.

Allow Data to be sent to GoTo

For more information, see Microsoft's support site.
Note: The following claims are required by GoTo, but they are usually part of the default Azure AD SAML configuration. The following claims must be included in the User attributes and claims configuration.
  1. Log in to https://portal.azure.com.
  2. Navigate to Azure Active Directory > Enterprise Applications > All application.
  3. Select the previously configured application name.

    Result: The Set up Single Sign-On with SAML menu is displayed.

  4. Next to User Attributes & Claims, select the edit icon.
  5. Under Claim Name, the following information is required:

    Result:

    Name Description Full Schema Address
    Email The email address you registered with GoTo http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress
    Given name Your first/given name http://schemas.xmlsoap.org/ws/2005/05/identity/claims/givenname
    Surname Your surname http://schemas.xmlsoap.org/ws/2005/05/identity/claims/surname

Provide information to GoTo

Provide the relevant information to GoTo and we make adjustments on your account. Contact your Account Manager to begin the SAML process.

  1. Verify domain ownership.
    You must prove ownership of your domain before Azure Active Directory can be activated for your account. There are two methods of verification: HTML upload and DNS record.
    Option Procedure
    Verify domain ownership by HTML Upload
    1. Create an html file named logmein-domain-confirmation.html to the website for your planned ADFS domain.
    2. In the logmein-domain-confirmation.html file, include a random string. Example: logmein-domain-confirmation jska7893279jkdhkkjdhask
    3. After you have created the logmein-domain-confirmation.html file containing the random string, email your Account Manager with the string and they will confirm the logmein-domain-confirmation.html is visible and contains the correct information.
    Verify domain ownership by DNS record
    1. Create a TXT for your domain's DNS entry with the value logmein-domain-confirmation.
    2. In the logmein-domain-confirmation TXT file, include a random string. Example: logmein-domain-confirmation jska7893279jkdhkkjdhask
    3. After you have created the logmein-domain-confirmation file containing the random string, email your Account Manager and they will confirm the logmein-domain-confirmation TXT file is visible and contains the correct information.
    Tip: If you do not have an Account Manager, you can get in touch with customer support by selecting Contact Support in this article.
  2. From https://portal.azure.com, the Certificate (Raw) and Federated Metadata XML must be given to your Account Manager.

    Result:

    Tip: If you do not have an Account Manager, you can get in touch with customer support by selecting Contact Support in this article.

Results: Once your GoTo representative has configured the SAML 2.0 connection using the information provided, your users gain access to the appropriate account and permissions via the IdP as the authentication source. It may take up to 30 minutes for the SSO service to be established for the first time.

Need help?

Contact icon Contact support
Manage Cases icon Manage cases
Community icon Ask the Community
Training icon Attend trainings
Video icon Watch videos
  • Language selector icon Language selector icon
    • English
    • français
    • italiano
    • Deutsch
    • español
    • português
    • Nederlands
  • About Us
  • Terms of Service
  • Privacy Policy
  • Trademark
  • Do Not Sell or Share My Personal Info
  • Browse Products
  • Copyright © 2025 GoTo Group, Inc. All rights reserved

Collaboration Products

GoTo Connect

GoTo Meeting

GoTo Webinar

GoTo Training

join.me

Grasshopper

OpenVoice

Remote Solutions Products

GoTo Resolve

Rescue

GoToAssist

Access Products

Pro

Central

GoToMyPC