You can create or update a SAML 2.0 SSO configuration from the Multi-Provider SSO feature.

Before you begin

Role required: admin

About this task

Note: New to the Jakarta release, you must validate your configuration by using the Test Connection functionality before you can activate your IdP configuration. You can still use the Update functionality to save your configuration data, but it is not an active configuration without a successful test connection.

Procedure

  1. Navigate to All > Multi-Provider SSO > Identity Providers.
  2. Do one of the following options.
    • To update a configuration, click an SSO configuration record.
    • To create a new configuration, click New > SAML.
  3. For a new configuration, enter the IdP information by one of the following methods:
    OptionDescription
    Using a metadata descriptor URL Click the URL check box and enter the URL of the IdP that you are using.
    Using metadata descriptor XML file Click the XML check box and paste in the XML data generated from the IdP you are using.
    Entering metadata manually Close the popup window and manually enter the data in the property fields.
    All required fields must be filled-in on the Identity Provider form. IdP form
  4. (Optional) Encryption And Signing tab
    Note:
    • It is recommended to use your own certificates for the encryption and signing.
    • The FIPS approved mode requires different certificates for Encryption and Signing
    • While using the certificates, make sure to update the following system properties with the sys_id of the certificates (x.509 Certificates):
      • Signing (glide.authenticate.sso.saml2.keystore)
      • Encryption (glide.authenticate.sso.saml2.encryption.keystore)
    • Make sure to update the key alias and key password of the Signing and Encryption keystores in the Identity Provider record and generate the metadata (Select Generate Metadata).
    • Upload the signing and encryption certificates present in the generated metadata (XML) to the Identity Provider.
    Encryption And Signing
  5. (Optional) User Provisioning tab
    User Provisioning Tab
    Table 3. User Provisioning fields
    Property Description
    Auto Provisioning User Enable automatic user provisioning, creates the users when user doesn't exists in the instance User Table based on the information provided by the IdP.
    Update User Record Upon Each Login Updates user information in the instance User table with the information in the IdP each time the user logs in using SAML.
  6. (Optional) Advanced tab
    Advanced tab