Didn't find what you're looking for? Contact Support











If you are using a district or school provided computer you should not be asked to login to Scholantis or other SharePoint sites when you're on the school network.

It doesn't matter if you're using Internet Explorer, Chrome, OneDrive or Outlook. You should not need to login again and again! If that's not the case try getting in touch with your IT department to ask if they can set it up for your school or district.

Don't worry it's still completely secure. Because you're already logged in to your district computer it's possible to automatically authenticate to Scholantis and other SharePoint sites.

But I'm not the IT person and it's my home computer!

If you're not using a district or school computer we can still save you from your password nightmare! If you’re constantly prompted for Scholantis or SharePoint prompts (in the browser, Outlook or OneDrive) you need to do two things. It's only 9 steps:

Internet Explorer & Chrome

  1. Open Internet Explorer and go to Tools () > Internet Options on the menu.
  2. Select the Security tab and click on the Local Intranet zone.
  3. Then select Sitesthen Advanced.
  4. Enter the Address (in the format *.district.com) and click Add (un-check Require Server Verification if the site does not use https).
  5. Restart Internet Explorer or Chrome (it uses the same settings) and voila! 

Outlook & OneDrive

  1. From the Start menu open Control Panel and start Credential Manager.
  2. Select Windows Credentials and then Add a Windows credential (on the right hand side).
  3. For Address enter *.district.com, username (in the format domain\username), your password, and hit OK.
  4. Restart Outlook or OneDrive and voila!

You can also try out the above steps on your district or school computer. It might not be possible depending on how your computer is configured, there's no harm in trying!

IT Administrator Guide

This part of the guide is to help your IT department configure automatic authentication. Feel free to provide them this reference to setup automatic authentication for your school or district.

All district and school computers can be configured to automatically authenticate users in Internet Explorer, Chrome, Outlook, OneDrive or Windows Explorer. Computers must be Active Directory domain attached and configuration is achieved using Active Directory Group Policy Objects (AD GPO).

Once configured, Windows login credentials are automatically passed so users never receive password prompts when visiting a site or opening documents when using domain computers.

Group Policy Configuration

Standard practice is to add your domain (*.district.com) or specific sub-domains (email.district.com, portal.district.com, my.district.com etc) to Internet Explorer's Local Intranet security zone using an Active Directory Group Policy.

There are 2 ways group policy can be used to configure Internet Explorer (and Chrome) security zones.

Site to Zone Assignment List

This method removes the ability for end users to change the security zone settings.

  • On an Active Directory server open the Group Policy Management Editor.
  • Select a custom policy or the Default Domain Policy and right click to Edit... the policy. 
  • Browse to User Settings > Administrative Templates > Windows Components > Internet Explorer > Internet Control Panel > Security Page.
  • Open the Site to Zone Assignment List, select Enable and choose Show... to configure the policy item.
  • Enter the URLs (e.g. *.district.com) as the Value name and 1 as the Value (1 = Intranet Zone, 2 = Trusted Sites, 3 = Internet Zone and 4 = Restricted Sites Zone).
Group Policy Registry Items

This method allows you to configure Security Zone sites and still allow end users to modify the settings. Zones removed by a user will be re-added on the next Group Policy refresh (GPUpdate).

  • On an Active Directory server open the Group Policy Management Editor.
  • Select a custom policy or the Default Domain Policy and right click to Edit... the policy. 
  • Browse to User Configuration > Preferences > Windows SettingsRegistry
  • Right click and choose New > Registry Item.
  • Separate entries are needed for each URL:
    • Key Path: Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\district.com\* (or you can use \portal)
    • Value name: https
    • Value type: REG_DWORD
    • Value data: 1  (1 = Intranet Zone, 2 = Trusted Sites, 3 = Internet Zone and 4 = Restricted Sites Zone)

Test your Group Policy

  1. Log on as a domain user on a domain computer. 
  2. Inside Internet Explorer open Tools > Internet Options and select the Security tab
  3. Select Local Intranet, click Sites and open the Advanced dialog. 
  4. The *.district.com or other URL should be listed. 
  5. If not, ensure you changes have propagated to all Active Directory server and re-login to Windows.

Chrome

Current versions of Google Chrome for Windows no longer require additional configuration for Kerberos and NTLM support. Chrome uses the Windows Internet Options from the Control Panel (the same as Internet Explorer). Group Policy settings should apply to both Chrome and Internet Explorer.

 Other Chrome settings can be configured using either Google Chrome for Business Admin Console or Group Policy. Google provides ADM and ADMX templates to add policies into Windows Group Policy. Adding the ADMX and ADML files to %SYSTEMROOT%\PolicyDefinitions folder will enable display of Group Policy Administrative Templates for Chrome in the Group Policy Management Editor.

Firefox

There are third-party solutions for providing Group Policy management for Firefox. It is also possible to automate Firefox configuration using Group Policy to configure the user preferences file.  The following entries can be added to the user.js file (%APPDATA%\Mozilla\Firefox\Profiles\[profile]):

  • user_pref("network.negotiate-auth.trusted-uris", "<PingFederate Base URL>");
  • user_pref("network.negotiate-auth.delegation-uris", "<PingFederate Base URL>");
  • user_pref("network.automatic-ntlm-auth.trusted-uris", "<PingFederate Base URL>");