You can create or update a SAML 2.0 SSO configuration from the Multi-Provider SSO feature.

Before you begin

Role required: admin

About this task

Note: New to the Jakarta release, you must validate your configuration by using the Test Connection functionality before you can activate your IdP configuration. You can still use the Update functionality to save your configuration data, but it is not an active configuration without a successful test connection.

Procedure

  1. Navigate to All > Multi-Provider SSO > Identity Providers.
  2. Do one of the following options.
    • To update a configuration, click an SSO configuration record.
    • To create a new configuration, click New > SAML.
  3. Enter the IdP information by one of the following methods.
    OptionDescription
    Using a metadata descriptor URL Click the URL check box and enter the URL of the IdP that you are using.
    Using metadata descriptor XML file Click the XML check box and paste in the XML data generated from the IdP you are using.
    Entering metadata manually Close the popup window and manually enter the data in the property fields.
    Note: All required fields must be filled-in on the Identity Provider form.
  4. (Optional) Encryption And Signing tab
    Note:
    • It is recommended to use your own certificates for the encryption and signing.
    • The FIPS approved mode requires different certificates for Encryption and Signing
    • While using the certificates, make sure to update the following system properties with the sys_id of the certificates (x.509 Certificates):
      • Signing (glide.authenticate.sso.saml2.keystore)
      • Encryption (glide.authenticate.sso.saml2.encryption.keystore)
    • Make sure to update the key alias and key password of the Signing and Encryption keystores in the Identity Provider record and generate the metadata (Select Generate Metadata).
    • Upload the signing and encryption certificates present in the generated metadata (XML) to the Identity Provider.
    Encryption And Signing
  5. (Optional) User Provisioning tab
    Table 3. User Provisioning fields
    Property Description
    Auto Provisioning User Enable automatic user provisioning, creates the users when user doesn't exists in the instance User Table based on the information provided by the IdP.
    Update User Record Upon Each Login Updates user information in the instance User table with the information in the IdP each time the user logs in using SAML.
  6. (Optional) Advanced tab
    Advanced tab
  7. (Optional) On the Continuous Authentication tab, configure the following fields:
    Note:
    • The Continuous Authentication tab appears only when you install the Zero Trust - Continuous Authentication (com.snc.zero_trust_continuous_authentication) plugin that requires license.
    • If you're using continuous authentication policy to protect access to table or data class, see Continuous Authentication.
    Continuous Authentication - tab information
    Table 5. Continuous Authentication
    Field Description
    Continuous Authentication Configured Select the check-box to set the configuration active.
    Continuous Authentication Consumer URL Provide the Consumer URL from the Identity Provider.
    Continuous Authentication Script

    Select the look-up icon to choose the script provided from the platform. In this configuration, for SAML: MultiSSOv2_SAML2_ContinuousAuth_custom