- Step 1: Sign up for PixieBrix
- Step 2: Create/Configure a Team
- Step 3: Ensure Team Member Access/Authentication
- Step 3a: Allowlist PixieBrix for Google or Microsoft OpenID Authentication
- Step 3b: Allowlist PixieBrix account login emails (aka Magic Links)
- Step 3c: Configure SAML/SSO
- Step 4: Set up Automatic User Provisioning
- Step 5: Allowlist Outgoing Browser Extension Traffic to PixieBrix in the Network Firewall
- Step 6: Configure the Enterprise Browser Policy
- Step 7: Create a Group with Team Members
- Step 8: Create a Mod Deployment
Step 1: Sign up for PixieBrix
- Visit: https://app.pixiebrix.com/
- On the login screen, authenticate with your preferred provider
- Microsoft (including Azure Active Directory)
- Email β sends a login link to your email
Troubleshooting
- Configure Login with Microsoft and Azure Active Directory
- Troubleshooting Google Integration Errors
- Network/Email Firewall Configuration
Step 2: Create/Configure a Team
- In the Admin Console click Create Team and provide a team name
- Select Settings for the team
- Configure the Team scope and default role:
- Team scope: a unique account alias to namespace your teamβs mods and bricks. The scope cannot be changed once your team has created a mod
- Default role: the default role for users automatically provisioned to your team
Step 3: Ensure Team Member Access/Authentication
Ensure your team members can access PixieBrix using your preferred authentication method:
- Google/Microsoft OpenID
- Account Login Emails (aka Magic Links)
- SAML/SSO
Step 3a: Allowlist PixieBrix for Google or Microsoft OpenID Authentication
This step requires Admin Access to your Microsoft Azure and/or Google Workspace account
- Configure Login with Microsoft and Azure Active Directory
- Control which third-party & internal apps access Google Workspace data
Step 3b: Allowlist PixieBrix account login emails (aka Magic Links)
This step requires Admin Access to your Email Provider
Follow the instructions to ensure the deliverability of system emails: Network/Email Firewall Configuration
- Allowlist the PixieBrix system email IP addresses
- Allowlist the PixieBrix email domain
Step 3c: Configure SAML/SSO
This step requires Admin Access to your Identity Provider (IdP)
- Follow the steps at: Configure SAML/SSO for PixieBrix
Step 4: Set up Automatic User Provisioning
- Email
support@pixiebrix.com
to verify your email domain for automatic user provisioning
Step 5: Allowlist Outgoing Browser Extension Traffic to PixieBrix in the Network Firewall
This step requires Admin Access to your Network Firewall
- Allowlist the required URLs: Network/Email Firewall Configuration
Step 6: Configure the Enterprise Browser Policy
This step requires Admin Access to your Enterprise Device Management policies
Follow the steps at Chrome Browser Extension Management
- Configure the Force Install Policy to automatically install the PixieBrix Browser Extension
- Configure the PixieBrix Browser Extension Policy as needed
Step 7: Create a Group with Team Members
Follow the steps at Account Management
- Create a Group
- Add Group Members, in one of the following ways:
- Upload a CSV in the Admin Console (see ), orAccount Management
- Use the to update group membership on a recurring basis, orDeveloper API
- Contact
support@pixiebrix.com
to set up automatic group enrollment by email domain
Step 8: Create a Mod Deployment
Deploy a mod to the group. Follow the steps at Managing Deployments
- Create a Deployment
- Assign the Group to the deployment