Enterprise Admin

Enterprise Admin Quick Start Guide

This Enterprise Admin Quick Start Guide covers the steps to:

  • Part 1: Enable Team Access to PixieBrix

  • Part 2: Provision PixieBrix at scale

Part 1: Enable Team Access to PixieBrix

Step 1: Sign up for PixieBrix

  1. On the login screen, authenticate with your preferred provider

    • Google

    • Microsoft (including Azure Active Directory)

    • Email — sends a login link to your email

Troubleshooting

Step 2: Create/Configure a Team

  1. In the Admin Console, click Create Team and provide a team name

  2. Invite your team members. See Roles for role-based permissions

  3. Select Settings in the left side nav

  4. Configure the Team scope and default role:

    • Team scope: a unique account alias to namespace your team’s mods and bricks. The scope cannot be changed once your team has created a mod

    • Default role: the default role for users automatically provisioned to your team

Admin Console > Settings > General Team Settings

Step 3: Ensure Team Member Access/Authentication

Ensure your team members can access PixieBrix using your preferred authentication method:

  • Google/Microsoft (OpenID)

  • Account Login Emails (aka Magic Links)

  • SAML/SSO

If running a pilot/POC, we recommend starting with Google, Microsoft, or Email login to get your team up and running quickly.

Step 3a: Allowlist PixieBrix for Google or Microsoft OpenID Authentication

circle-info

Allowlisting Login with Google/Microsoft required Admin Access to your Microsoft Azure and/or Google Workspace account

circle-info

Allowlisting PixieBrix emails requires Admin Access to your Email Provider

Follow the instructions to ensure the deliverability of system emails: Network/Email Firewall Configuration

  1. Allowlist the PixieBrix system email IP addresses

  2. Allowlist the PixieBrix email domain

Step 3c: Configure SAML/SSO

circle-info

Configuring SAML/SSO requires Admin Access to your Identity Provider (IdP)

  1. Follow the steps at: Setting Up SAML/SSO

Step 4: Allowlist Outgoing Browser Extension Traffic to PixieBrix in the Network Firewall

circle-info

Allowlisting traffic requires Admin Access to your Network Firewall

  1. Allowlist the required URLs: Network/Email Firewall Configuration

Step 5: Allowlist the PixieBrix Chrome Browser Extension

circle-info

This step requires Admin Access to your Enterprise Device Management policies

  1. Allowlist the PixieBrix Chrome Browser Extension: mpjjildhmpddojocokjkgmlkkkfjnepo. See Browser Extension Installation Policy

Part 2: Provision PixieBrix at Scale

circle-info

This step requires Admin Access to your Enterprise Device Management policies

Step 6: Set up Automatic User Provisioning for your Domain

  1. Email [email protected]envelope to enable automatic user provisioning for your email domain(s)

Step 7: Force-install the PixieBrix Browser Extension

Follow the instructions at: Browser Extension Installation and Configuration

  1. Force-install the browser extension

  2. Configure the Browser Extension Policy

Step 8: Create a Group for Group-Based Access Control

Follow the steps in the Groups documentation

  1. Click the Groups menu item in the left side nav

  2. Create a Group

  3. Add group members in one of the following ways:

Step 9: Enable SAML/SSO

circle-info

Configuring SAML/SSO requires Admin Access to your Identity Provider (IdP)

  1. Follow the steps at: Setting Up SAML/SSO

Last updated

Was this helpful?