How to set up SSO configuration

GetCertified can act as a Service Provider through the SAML 2.0 protocol, which allows the exchange of authorization data with an Identity Provider. GetCertified supports OneLogin, Okta, SSO Circle, and many other Identity Providers.

SAML 2.0 based Single Sign-on (SSO) can be configured for multiple identity providers simultaneously. You need to create an SSO configuration and define the parameters of the identity provider. Each created SSO configuration you create has an assertion consumer service end-point that will process the SAML response.

Configuring the SSO

Navigate to the settings icon and select the System settings option.

  1. Click the “Single Sign-on” tab.
  2. By clicking the “Add new configuration” button, a new pop-up window will appear where you can enter the parameters of the new SSO configuration.

When creating a new  SSO configuration, you need to enter the parameters for configuring the service provider’s side. GetCertified provides the parameters that you need to configure the identity provider’s side.

  1. Enter the “Name” of the SSO configuration. The name must be unique for each SSO configuration since it identifies the SSO configuration.
  2. Optionally enter the “Description” of the SSO configuration.
  3. Choose the “Status” of the SSO configuration. If the status is “Enabled,” users will be able to sign in with the identity provider specified in the configuration. Otherwise, they will not be able to do so.
  4. Use the provided “Service provider Entity ID” URL to configure the service provider on the identity provider’s side. The value represents the service provider’s identifier.
  5. Use the provided “Assertion consumer service URL” to configure the service provider on the identity provider side. The field’s value represents the end-point URL, where the SAML response from the identity provider will be returned.
  6. Choose the “Assertion consumer service binding” that is suitable for the identity provider. The field’s value represents the SAML protocol binding when returning the SAML response from the identity provider.
  7. Enter the “Identity provider Entity ID,” identifier of the provider entity. The entered value must be an URL.
  8. Enter the “Single sign-on service URL,” an URL of the identity provider’s single sign-on service end-point, where the service provider will send the authentication request.
  9. Choose the “Single sign-on service binding,” a SAML protocol binding when the service provider sends the authentication request to the identity provider.
  10. Input the “Certificate,” the public x509 certificate of the identity provider. The certificate must be in a string format without headers. Use the tool on the following link to convert the certificate to a string format without headers.
  11. Enter the “Username attribute,” the name of the assertion in the SAML response whose value will be used as the GetCertified user’s username.
  12. Enter the “Email attribute,” the name of the assertion in the SAML response whose value will be used as the GetCertified user’s email.
  13. Optionally enter the “First name attribute,” the name of the assertion in the SAML response whose value will be used as the GetCertified user’s first name.
  14. Optionally enter the “Last name attribute,” the name of the assertion in the SAML response whose value will be used as the GetCertified user’s last name.

If you configured everything appropriately, the option to sign in with SSO should be visible on the login page.

NOTE: Please contact our support team at support@youtestme.com if you have trouble configuring your SSO.

 

Was this article helpful?
Dislike 0
Previous: How to enable/disable self-registration module
Next: How to customize application’s interface text
Have questions? Search our knowledgebase.