SAML Service Provider Setup
This guide gives an overview of how to configure an application to work with Acceptto’s SSO service, which allows access to the application using Acceptto authentication technology. You will be configuring your application to act as a Service Provider and configuring Acceptto to act as an Identity Provider.
- Acceptto Appliance configured to connect to your user directory
- An Acceptto Organization account, with access to an administrative user
- An Application that supports SAML 2.0 authentication
Setup a SAML Application
- Login to Acceptto with a user account that has administrative privileges.
- Click on the “Applications” option on the menu bar.
- Click on the “New Application” button
- On the “Add Application” form, enter the following:
- App Name - Application name to be displayed in the admin panel and application portal
- Issuer or EntityID - The Issuer/EntityID of the SAML application. For example: ‘google.com/a/org.com’
- Sign In URL - The URL used to sign in to the application
- Metadata URL - The URL that includes that SAML application metadata
- Click “Save” to create the application.
Note: Clicking the “Advanced Options” button allows additional optional configuration such as encryption certificates or custom attribute assertions.
Configure your SAML Application with Acceptto
- On the Add Application Page, select ‘Identity Provider Configuration’
- Use the configuration data in the settings page to configure you application
- Identity Provider Issuer. This is the name of the issuer of the SAML. It may be referred to as the “EntityID” or “Idp Name”
- Single Sign-On URL. This is the URL the SP uses to send SAML requests. It may be referred to as the “SAML Endpoint” or “SSO URL”
- X509 Certificate. This is the certificate used to validate SAML tokens.
- NameIdFormat. This is the user name format in which the user’s identity is asserted to the SAML application.
- Using the above data, configure your application according to the vendor instructions.
- If your application requires any additional attribute assertions, please access the admin panel and add these via the “Advanced Options” button on the “Add Application”.
- It is recommended to test your application by configuring a separate URL in addition to the normal authentication url, in order to test SAML while leaving the local authentication option available.
If you require assistance, please email us at firstname.lastname@example.org
Want to learn more about our MFA solutions? Contact our Professional Services for a Demo today.