Single Sign On

Setup Single Sign On for SAML Apps

0 views June 4, 2019 July 4, 2019 0

miniOrange provides Single Sign-on for SAML apps. Security Assertion Markup Language (SAML) is an XML standard that allows secure web domains to exchange user authentication and authorization data. Using SAML, an online service provider (SP) can contact a separate online identity provider to authenticate users who are trying to access secure content.

miniOrange provides a solution to perform single sign-on(SSO) for application supporting SAML protocol like AWS, WordPress,  Atlassian, Dropbox Enterprise, moodle, SAP, Zoho, zendesk, etc.

Configure Single Sign-On (SSO) Settings for SAML Apps:

  1. Login as a customer from the Admin Console.
  2. Go to Apps >> Manage Apps. Click Configure Apps button.
  3. Click on SAML tab. Select the App and click on the App icon.
  4. If you can’t find your application in the below list, search for custom to save your SAML App settings and later you can also submit your app request to add the application as a pre-integrated app.
  5. SP Entity ID is used to identify your app against the SAML request received from SP. Make sure the SP Entity ID or Issuer is in this format: https://www.domain-name.com/a/[domain_name]/acs.
  6. ACS URL or Assertion Consumer Service URL defines where the SAML Assertion should be sent after authentication. Make sure the ACS URL is in the format: https://www.domain-name.com/a/[domain_name]/acs.
  7. Single Logout URL defines where the user should be redirected after receiving the logout request from SP. You can mention your applications logout page URL here. Make sure the Single Logout URL is in the format: https://mail.domain-name.com/a/out/tld/?logout.
  8. Audience URI, as the name suggests, specifies the valid audience for SAML Assertion. It is usually the same as SP Entity ID. If Audience URI is not specified separately by SP, leave it blank.
  9. NameID defines what SP is expecting in the subject element of SAML Assertion. Generally, NameID is Username of Email Address
  10. NameID Format defines the format of subject element content, i.e. NameID.
    For example, Email Address NameID Format defines that the NameID is in the form of an email address, specifically “addr-spec”. An addr-spec has the form local-part@domain, has no phrase (such as a common name) before it, has no comment (text surrounded in parentheses) after it, and is not surrounded by “<” and “>”.
    If NameID Format is not externally specified by SP, leave it unspecified.
  11. You can Add Attributes to be sent in SAML Assertion to SP. The attributes include user’s profile attributes such as first name, last name, fullname, username, email, custom profile attributes, and user groups, etc.
  12. Select a Group Name from the dropdown – the group which should have access to the SAML SSO using this app.
  13. Give a policy name for Custom App in Policy Name.
  14. Select the First Factor Type for authentication like Password, Mobile, etc.
  15. Enable Second Factor for authentication if required.
  16. Click on Save button to add policy for Apps (Single Sign-On).SAML apps SSO
  17. You can Click on Import SP Metadata button to set miniOrange as an IDP.
  18. You can set miniOrange as IDP using the following information :
IdP Entity ID or Issuer  https://<mycompany.domain-name.com>/<customer-id>
SAML Login URL https://<mycompany.domain-name.com>/idp/samlsso
SAML Logout URL https://<mycompany.domain-name.com>/idp/samllogout
Broker Service Login URL https://<mycompany.domain-name.com>/broker/login/saml_login
Broker Service Logout URL https://<mycompany.domain-name.com>/broker/login/saml_logout
X.509 Certificate X.509 certificate is enclosed in X509Certificate tag in IdP-Metadata XML file. (parent tag: KeyDescriptor use=”signing”)

 

You can edit Application by using following steps:

  • Login as a customer from Admin Console.
  • Go to Apps >> Manage Apps.
  • Search for your app and Click on edit in Action menu against your app.