SSO Integration using SAML 2.0
June 2022
How to Configure SAML 2.0
To initiate the integration process, SupportLogic will provide an entity ID and an Assertion Consumer Service (ACS) URL after our internal configuration. Please forward this information to your Identity Provider (IdP) administrator to create a SAML application within your identity management system. This step is crucial for ensuring a secure authentication setup.
Overview of SAML Integration with SupportLogic
SupportLogic utilizes SAML 2.0 compliant systems as an Identity Provider (IdP) for user authentication. This integration aligns with your organization's existing authentication methods to provide a secure and seamless user experience.
Configuring an Identity Provider (IdP) for SSO with SupportLogic
To enable Single Sign-On (SSO), collaboration is required between your IdP administrator and SupportLogic's DevOps team. This cooperation will use your organization's IdP to manage access effectively to the SupportLogic platform.
Prerequisites for SSO Configuration
Provide the following details to SupportLogic from your IdP administrator:
- IdP Issuer URI
- IdP Single Sign-On URL
- IdP Signature Certificate (in PEM format)
After these details are submitted, SupportLogic's DevOps team will finalize the necessary configurations on your environment and provide additional instructions to complete the setup.
Configuration of Custom Attributes for SAML Integration:
To ensure seamless integration with SupportLogic, your IdP administrator needs to configure specific custom attributes in the designated SAML application. These attributes are crucial for transmitting user details from the IdP to SupportLogic, thereby enhancing user management capabilities.
Required Attributes:
- Full Name: Essential for user identification.
- Email: Necessary for user login and notifications.
Optional Attributes (Recommended for Enhanced Functionality):
- Role/Title: Facilitates automatic provisioning of user permissions and profiles.
- Picture: Improves user profile visualization and personalization.
It's vital to ensure these attributes are correctly mapped in the SAML configuration to avoid any disruptions in user synchronization and authentication processes.
Was this article helpful?
That’s Great!
Thank you for your feedback
Sorry! We couldn't be helpful
Thank you for your feedback
Feedback sent
We appreciate your effort and will try to fix the article