Configure SAML-based SSO for any identity provider

Configure SAML-based SSO for any identity provider

Overview

This article lists all information you need to add our service provider (SP) to your system and what we require to add your identity provider (IdP) to our system.

About our service provider

  1. Metada location: https://sia-sso.azurewebsites.net/Saml2
  2. Entity Identifier: https://sia-sso.azurewebsites.net/Saml2
  3. Assertion Consumer Service URL (Reply URL):  https://sia-sso.azurewebsites.net/Saml2/Acs
  4. NameIdPolicy: urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress
    1. Your IdP has to support this policy

Claims you need to pass


Information we need from your identity provider

  1. Entity Identifier
  2. Single-sign on URL (also called Login URL)
  3. SAML Signing Certificate

Information we need from you

  1. (Optional) Role mapping
    1. Please list the possible values which can be in the “Role” claim and what role should it translate to in SchoolInfoApp’s system.
    2. Example:
      1. Your role 1 - Administrator
      2. Your role 2 - Student
  2. Default role
    1. This will be assigned to all users we are unable to map.






    • Related Articles

    • Configure SAML-based SSO using Google Workspace (Formally G-Suite)

      Overview Get started with simplified user logins by setting up single sign-on (SSO) with Google Workspace for your site. After you set up SSO, your users can sign in to the mobile app by using their Google Workspace credentials. Set up a new SAML app ...
    • Configure SAML-based SSO using Office 365

      Office 365 uses Azure Active Directory (Azure AD) as a user store so refer to Configure SAML-based SSO using Azure Active Directory. In the last step, you have to send us an email. In that email let us know, that you use Office 365.
    • Configure SAML-based SSO using Azure Active Directory

      Overview Get started with simplified user logins by setting up single sign-on (SSO) with Azure Active Directory for your site. After you set up SSO, your users can sign in to the mobile app by using their Azure AD credentials. Create an application ...
    • Configure SAML-based SSO using Active Directory Federation Services (AD FS)

      Overview Get started with simplified user logins by setting up single sign-on (SSO) with Active Directory Federation Services for your site. After you set up SSO, your users can sign in to the mobile app by using their AD credentials. Add new Relying ...
    • Directory Feature

      Objective To explain in detail how to use the Directory Feature including Adding a user to a desired folder, setting up a folder, and explaining over arching general settings that apply to the entire Directory as a whole Folder Settings Create a ...