Changes

Jump to: navigation, search

Single Sign-On

296 bytes added, 21:53, 5 January 2023
Azure
* To test or use this connection use your internal ADFS URL and specify the loginToRp parameter as the SmartSimple SAML entity ID, e.g. '''https://adfs.yourlocaldomain.com/adfs/ls/idpinitiatedsignon.aspx?loginToRp=https://alias.smartsimple.com/'''.<br/> If you aren't automatically redirected into SmartSimple you may need to have RelayState enabled in ADFS, and then use a RelayState parameter to achieve this, e.g. '''https://adfs.yourlocaldomain.com/adfs/ls/idpinitiatedsignon.aspx?RelayState=RPID%3Dhttps%3A%2F%2Falias.smartsimple.com%2F%26RelayState%3Dhttps%253A%252F%252Falias.smartsimple.com%252F'''.
====AzureIdentity Provider====
Configuration items listed are specifics SSO to work in SmartSimple:
:: '''SSOModule''': constant value that is going to be used in the SmartSimple configuration "SSO Alias"
: Note that all attribute names are case sensitive and should be named are indicated above.  First name, Last name and Email are mandatory to create a new user.
 
After configuration has been completed, provide the following to SmartSimple:
 
# x509 certificate - download the ''Federation Metadata XML (''Found under ''Single Sign-on''  →  ''SAML Certificates'')
# Value used for the NameID - this will be used as the identifier between SP and IdP
#* "User Access URL" for IdP-initiated SSO (Found under "''Properties''")
#* "Logon URL" for SP-initiated SSO (Found under ''Single Sign-on''  →  ''Set up 'Application Name')''
 
* To test, go to ''Single sign-on'', click on ''Test this application'' from the tab header. Select "Sign in as current user" and click on the ''Test sign in'' button. Please make sure that the current user is existing in the SmartSimple instance to have a successful SSO login.
====OKTA====
Smartstaff
1,390
edits

Navigation menu