Service Provider Configuration (SSO)

Configuring a Service Provider Connector

To configure a Service Provider connector for a customer, specific information exchange is required.

  1. Determine the customer's Identity Provider (IdP).

    • Once identified, refer to the relevant section below for details.
  2. Log the request in Jira as a task under the Triage project.

    • Add the label SSO to the ticket.

AzureAD

What we need from the customer:

  • Application/Secret Key
  • Application ID
  • Microsoft Azure AD Domain

What we provide to the customer:

  • Callback URL: https://auth.surecloud.io/login/callback

ADFS

WS-Federation Connector

What we need from the customer:

  • Federation metadata file (XML) – either the file itself or a URL where it can be downloaded.

What we provide to the customer:

  • Callback URL: https://auth.surecloud.io/login/callback
  • Relying party trust identifiers: urn:auth0:prod-aurora-surecloud
  • Claim rule template: Send LDAP Attributes as Claims

SAML

Examples: Okta, Auth0, Ping, Google

What we need from the customer:

  • X509 signing certificate (Identity Provider public key in PEM or CER format)
  • Sign-in URL

What we provide to the customer:

  • Assertion Certificate (PEM)
  • SP Entity ID (Audience URI):
    urn:auth0:prod-aurora-surecloud:<connector>
  • Single Sign-On URL (Assertion Consumer Service URI):
    https://auth.surecloud.io/login/callback?connection=<connector>&organization=<organization_id>
  • Single Logout URL:
    https://auth.surecloud.io/logout

Note: Replace <connector> and <organization_id> with values specific to the organization, provided during setup.

SAML claim mapping:

The following SAML claims must be present to correctly populate user records:

  • Email Address: email
  • First Name: given_name
  • Last Name: family_name

IDP initiated SSO

IDP-Initiated SSO allows the customer to initiate login from a site other than the platform, such as their internal web page.

Enable in Auth0:

On the tenant's enterprise SAML connection, enable IdP-Initiated SSO with these settings:

  • Accept Request
  • Default application: prod-uk-auth0-single-page-application
  • Response Protocol: OpenID Connect
  • Query String (replace SUBDOMAIN with the tenant's subdomain):
    scope=openid email&redirect_uri=https://SUBDOMAIN.surecloud.io/idpLogin

idp-setup.png

 

Was this article helpful?
1 out of 1 found this helpful