Instead of each of your users having to remember another username and password to access the Data8 website, you can use Azure AD, your corporate AD FS server or other STS that supports WS-Federation to manage access.
This allows users to access the website securely without having to enter another username and password, and also gives you a single point of management (your internal user directory) to ensure that user accounts are disabled as required. Once a user is disabled in your directory they won't be able to log on to the Data8 website.
Enter a display name such as "Data8 Website" and click Next
Leave "Permit all users to access this relying party" and click Next. This will allow AD FS to issue tokens for any user, but you will still control individual user's access rights via the Data8 website.
Click Next again, then Close.
In the "Edit Claim Rules" dialog that appears, click "Add Rule..."
Leave "Send LDAP Attributes as Claims" selected and click Next.
Give the rule a name such as "UPN"
Select the "Active Directory" attribute store
Select "User-Principal-Name" as the LDAP Attribute and "UPN" as the Outgoing Claim Type.
Click Finish, then OK
AD FS is now configured, so you can now set up the Data8 website to trust the tokens issued by AD FS by going to the Federated Authentication Configuration page, entering the federation metadata URL of your AD FS server and clicking Update. This URL will be of the form https://sts.contoso.com/FederationMetadata/2007-06/FederationMetadata.xml, replacing sts.contoso.com with the full domain name of your AD FS server.