Skip to main content

SAML2

How does SSO workSSO works based upon a trust relationship set up between an application, known as the service provider, and an identity provider, like OneLogin. ... In SSO, this identity data takes the form of tokens that contain identifying bits of information about the user like a user's email address or a username.

How to set up a SAML-2 saml2-compatible identity providerproviders...

XML Set Up 

  • Log in to Identity Provider (One Login) 
  • Go to "Applications"
  • Click on "AddApp"
  • Search for "SAML"
  • Select "SAML Test Connector (Advanced) 2.0

 

SAML-Search-OL.PNGAuthentication-Page.PNG

  • Insert a display name 
  • Click Save
  • Log into CMS
  • Select App 
  • Click on "Settings"
  • Click on "Authentication"
  • Click on "Add Provider"

 

Authentication-Page.PNG

  • Fill in; "Provider Name"
  • Return to One Login IDP and copy the Metadata URL by clicking on more actions and right-clicking URL 
  • Copy the link into the CMS field "Metadata URL"
  • Insert a name into the "Unique User I.D" field (for example; NameId)
  • Click Save in CMS
  • Click on "View Configuration"
  • Copy the "Relay State URL" into the Configuration TAB in One Login TAB 
  • Copy the "Audience" into the Configuration TAB in One Login TAB 
  • Copy the "Recipient" into the Configuration TAB in One Login 
  • Click Save in One Login 
  • Click on the "Parameters" TAB in One Login TAB  

Field Mapping

  • Click the Add + Icon 
  • Type in the "Field Name"
  • Tick the "Include SAML assertion" box

One-Login-Field-Mapping.PNG

CMS-Field-Mapping.PNGCMS-Field-Mapping.PNG

  • Enter each field mapping and click "Save"
  • Click Save

Adding a User to the App through One Login

  • Click on "Users"
  • "New Users"
  • Fill in the new user's details 

One-Login-New-Users.PNG

  • Click "Save User"
  • Click on "Applications" on the side panel on the screen 
  • Click "Add Application" 
  • Select the App you wish to grant the user permission to

One-Login-new-User-Field-.png

  • Click "Continue"
  • Click "Save"

Logging into Front End

  • Open up Front End of App

FE-SSO-Login-Screen.PNGFE-SSO-Login-Screen.PNG

  • Click on "Sign In"
  • Enter your credentials
  • At this point, if any more User information is required then a screen will appear for the user to fill them in (for example; first name), otherwise, you will receive a "Success Screen" before FE loads up up 
  • As this is the first time the User will of logged in, they will receive the company privacy message to accept or decline
  • The user is now logged into the App App 

Manual Set Up

  • Log in to Identity Provider (One Login) 
  • Go to "Applications"
  • Click on "AddApp"
  • Search for "SAML"
  • Select "SAML Test Connector (Advanced) 2.0
  • Insert a display name 
  • Click Save 
  • Log into CMS
  • Select App App 
  • Click on "Settings"
  • Click on "Authentication"
  • Click on "Add Provider"
  • Check the "Manual Set Up" option option 
  • Fill in; "Provider Name"
  • Return to "One Login" and select the SSO TAB 
  • Copy the "Certificate" into the required field in CMS
  • Copy the "Issuer URL" into the "Entity I.D" in CMS
  • Copy the "SAML2 Endpoint" into the "URL" field in CMS
  • Fill in the "Unique User I.D Field" in CMS
  • Click "Save" in CMS

**Copy the Field Mapping steps from Above**

**Repeat Adding a New User to the App through One Login steps from Above**

**Repeat the Logging into Front End steps from Above**

Branding the Login Page with SSO...

The Front End Login page can be branded with unique text and/or with a logo through CMS.  

  • Log into CMS
  • Select App
  • Click on "Settings"
  • Click on "Authentication"
  • Click on "Edit"  
  • Click on the "Display TAB"

CMS-Display-TAB-SSO.PNGCMS-Display-TAB-SSO.PNG

  • Upload the image you wish to add to the login page
  • Type the text you would like to appear (For Example... "Please log in"
  • Click Save