Create SAML Provider
You can only configure single sign-on (SSO) in an on-premises Adaptiva Server. This does not apply to our SaaS solution.
SAML (Security Assertion Markup Language) on the OneSite platform allows you to configure a SAML provider in order for your users to login via SSO.
Below are some SAML Provider specific guides:
Create the SAML Provider in the Admin Portal
Log in to the Admin Portal as a Super Admin.
Click the gear icon > Settings > Security > SAML Providers.
On the SAML Providers page, click + New.
Enter a name and description. You can also add a logo (.png).
Under SAML Settings, configure the following values:
Issuer ID - The unique name this provider puts in it's
saml:Issuerelement. Used to look up the signing key when receiving a response.Authentication Request URI - The URI to send a
saml:AuthnRequest. If not set, can not request login usingsaml:AuthnRequest, but can still receive responses from the service provider.Attribute Consuming Service Index - The index given to the Adaptiva client if registered with the provider. If not set, the Adaptiva Server will automatically set a
AsertionConsumerServiceURLattribute anysaml:AuthnRequestit builds.Name ID Format - The NameID format to request from the provider. If blank, it is equivalent to
urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified. At construction, it will be set tourn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress.Public Key Info - The signing key in PEM format used to verify the signature of a SAML response.
Audience - The audience the server will expect to be declared in the SAML response. If not set, the server's auto-detected URL will be used.
Click Save.
Create the Administrator account
After creating the SAML Provider, register users as Administrators using the following steps:
Select Settings > Security > Administrators.
Click +New and create an Administrator account.
From the Admin Type dropdown, select SAML.
Enter the email address for the user you are creating.
The system uses this address to send an email invitation to the user, and to match the user with their IAM service identity. This email address must have been granted permissions in the IAM’s SAML application.
Click the Identity Provider drop-down and select the provider you created earlier.
In the Subject ID field, enter the same email address used above.
Under Administrator Details, enter the first and last name of the user and add any additional information needed.
Under Direct Roles, click Browse. Select the appropriate role(s) for the administrator and click OK.
Select Save.
Test the Login
Ask the user to test the login using SAML.
Navigate to the Admin Portal. The login screen now lists the new SAML Provider.
Select the new provider and log in to the portal using your IAM credentials.
You may see the error Error Message = Invalid Audience: https://ws25Tester:443, Error Code = 13 (0xd), Source Object = null propertyName[null] In this example the server FQDN has a capital T in the server FQDN Entity ID. Make sure the Audience entry matches the case returned in the error.
Last updated
Was this helpful?