Overview

Functionality

The SSO by SAML feature allows users to authenticate and access multiple applications using a single set of credentials via the Security Assertion Markup Language (SAML) protocol. This feature streamlines the login process, enhances security, and reduces the need for multiple passwords.

Target Audience

This feature is designed for organizations looking to implement Single Sign-On (SSO) for their users, providing a seamless and secure authentication experience across various applications.

Key Features and Benefits

  • Centralized Authentication: Log in once to access multiple applications without re-entering credentials.
  • Enhanced Security: Reduces the risk of password fatigue and phishing attacks by minimizing the number of passwords users need to remember.
  • Improved User Experience: Simplifies the login process, reducing the time and effort required to access different services.

Access Instructions

To access the SSO by SAML feature, you must provide either a SAML metadata link or specific configuration details to the Corgea support team.

SAML Configuration Instructions

Setting Up SSO SAML in Your SSO Provider

  1. Access your SSO provider account and set up the SAML application using these parameters:

For the “Attribute Statement (optional)” section, use the following mappings:

  • Name -> Value

    • email -> user.email
    • firstName -> user.firstName
    • lastName -> user.lastName

Ensure to update permission setting for the user, if needed.

Upon completing the setup, a new SAML metadata link will be provided.

Integrating SAML with Corgea

1

Navigate to Integrations

Log into your Corgea account and head to the “Integrations” section.

2

Initiate SAML SSO

Select the “Add” option within the “SAML SSO” area.

3

SAML Configuration

  • Input the SAML metadata URL in the “Metadata URL” field.
  • Press the “Fetch and Populate” button to auto-fill fields such as Entity ID, SSO URL, and X.509 Certificate using the metadata.
  • Configuration Name: Assign a name to your SAML configuration.
  • Email Domain: Define the email domain for SSO setup.

Manual Entry (if necessary):

  • Should manual input be needed, ensure you have the following details:
    • Entity ID: The SAML entity’s unique identifier.
    • X509 Certificate: The certificate for signing SAML assertions.
    • Single Sign-On Service Location: The URL for SAML IdP authentication responses.
4

Finalize Configuration

  • Check the accuracy of the auto-filled fields.
  • Hit the “Connect” button to finalize and save your SAML configuration.

Login by SSO.

  • Once SAML configuration is properly configured, you should be now able to login through your SSO service.
  • User Login: Authenticate through the SAML IdP and get redirected back to the application with a SAML assertion. After entering your email address on the initial login page, the “Login by SAML” option will appear on the step 2 page if the setup is correct. This option is triggered by the email domain.
1

Initial Login Page

Enter your email address on the initial login page. If your email domain is configured for SSO, the “Login by SAML” option will appear on the next page.

2

Login by SAML Option

Click on the “Login by SAML” button to proceed with authentication through your SAML Identity Provider (IdP).

3

SAML Authentication

You will be redirected to your SAML IdP for authentication. Enter your credentials as required by your IdP.

4

Redirect to Application

After successful authentication, you will be redirected back to the application with a SAML assertion, granting you access.

Step-by-Step Guide to Configuring SSO SAML for Microsoft Entra

1

Access Azure Active Directory

Begin by logging into your Azure portal. Once logged in, navigate to the “Azure Active Directory” section.

2

Create a New Application

  • Go to “Enterprise applications” and select “New application”.
  • Opt for “Create your own application” and provide a name for your new application.
3

Configure SAML-based Sign-On

  • Within the application settings, choose “Single sign-on” and select “SAML”.
4

Copy SAML Metadata URL

  • Copy the Federation Metadata XML URL for later use.
5

Populate SAML Configuration in Corgea

  • Log into your Corgea account and proceed to the “Integrations” section.
  • Click on ”+ Add” button in SAML SSO section.
  • Enter the copied SAML metadata URL into the “Metadata URL” field and click “Fetch and Populate”.
  • Check the auto-filled fields for accuracy.
6

Finalize and Test Configuration

  • Click the “Connect” button to save your SAML configuration.
7

Copy Updated Corgea SSO URLs

  • After saving the SAML integration, view the updated identifier and ACS URL by clicking “View All” in the SAML SSO section.
8

Fill in SSO SAML Config on Entra

  • Enter the copied SSO fields into the corresponding fields on your SAML Basic configuration page in Entra.
  • Double-check all entries for accuracy to ensure a successful SSO connection, then click the “Save” button at the top.
9

Test login by SSO

Now you should be able to login with configured domain through login page. Login by SSO

Prerequisites or Dependencies

  • A configured SAML Identity Provider (IdP).

Best Practices

  • Regularly Update Certificates: Ensure that your x509 certificates are up-to-date to maintain secure connections.
  • Test Configurations: Before rolling out SSO to all users, test the configuration with a small group to ensure everything works as expected.

Troubleshooting

  • Missing Referer Header: If you receive a “Missing Referer header” error, check that the HTTP_ORIGIN is correctly configured in the request headers.
  • No SAML Configuration Found: If the configuration is missing, ensure that the correct referer URL or email domain is being utilized.
  • Permission Update: If a user cannot access the SAML application, verify that their permissions are correctly configured and updated.

Additional Resources

SCIM as an Optional Feature

Overview

Functionality

SCIM (System for Cross-domain Identity Management) is an open standard designed to manage user identities in cloud-based applications and services. It automates the exchange of user identity information between identity domains or IT systems, making it easier to manage user accounts across multiple platforms.

Target Audience

This feature is ideal for organizations that need to manage user identities across various applications efficiently.

Key Features and Benefits

  • Automated User Provisioning: Automatically create, update, and deactivate user accounts in connected applications, reducing manual effort and errors.
  • Consistent User Data: Ensures that user information is consistent across all integrated applications, improving data accuracy and compliance.
  • Scalability: Easily manage a large number of users across multiple platforms, making it suitable for growing organizations.
  • Security: Enhances security by ensuring that user access is promptly updated or revoked as needed.

Why Customers Want SCIM

  • Efficiency: Automates repetitive tasks, freeing up IT resources for more strategic initiatives.
  • Accuracy: Reduces the risk of human error in user management, ensuring that user data is always up-to-date.
  • Compliance: Helps maintain compliance with data protection regulations by ensuring that user data is consistently managed and protected.
  • Integration: Seamlessly integrates with existing SSO solutions, providing a comprehensive identity management system.

SSO SCIM Provider Configuration

To enable SCIM functionality, you need to configure the SCIM application in your SSO provider with the following settings:

  • Ensure SCIM is enabled.
  • Set up the Application SCIM Integration with:
    • SCIM connector base URL: https://www.corgea.app/scim/v2/
    • Unique user identifier field: email
    • Supported provisioning actions:
      • Push New Users
      • Push Profile Updates
    • Authentication Mode: HTTP Header

Please contact the Corgea support team to obtain the necessary API token.

By enabling SCIM, organizations can significantly enhance their identity management processes, leading to improved operational efficiency and security.