Configuring SAML Authentication for Single Sign-On (SSO)
Overview
This guide outlines how to enable SAML-based Single Sign-On (SSO) for seamless access to our application. SAML (Security Assertion Markup Language) is a standard for exchanging authentication and authorization data between an identity provider and a service provider.
Prerequisites
Ensure you have administrative access to your SAML identity provider and can update the service provider settings.
Configuration Details
Service Provider (SP) Configuration
Provide the following details to your identity provider:
Entity ID: A unique identifier for your service provider.
https://paperbox-env
.firebaseapp.com/__/auth/handlerenv
beingacc
orprd
Assertion Consumer Service (ACS) URL: Where the SAML response is sent.
https://paperbox-env
.firebaseapp.com/__/auth/handlerenv
beingacc
orprd
Identity Provider (IdP) Configuration
Collect these details from your identity provider:
SAML Login URL: Where SAML authentication requests are sent.
Example: https://login.microsoftonline.com/tenantId
/saml2tenantId
being your Microsoft Tenant/Directory identifierX.509 Certificate: The public certificate from your IdP for verifying SAML responses.
-----BEGIN CERTIFICATE-----
...
-----END CERTIFICATE-----
Requested Attributes
The application requires the following attribute in the SAML assertion:
- User Email Attribute: This is often denoted as
user.mail
.
User Roles
Users will be assigned roles based on the following:
- Standard Roles:
user
andadmin
Configuration Steps
Accompanied by examples using Microsoft Entra (Formerly Azure Active Directory)
Configure Your Identity Provider:
- Access your IdP's admin console and create a new SAML application. Set the redirect URI to the correct SP URL.
Microsoft Entra -> App Registration -> Authentication
- Enter the SP configuration details: Entity ID and ACS URL.
Microsoft Entra -> Enterprise Apps -> Single Sign On
- Set the attribute release policy to include
user.mail
.Microsoft Entra -> Enterprise Apps -> Single Sign On
- Obtain the IdP metadata, which includes the SAML Login URL and X.509 Certificate.
Microsoft Entra -> Enterprise Apps -> Single Sign On
- Configure the SP roles
user
andadmin
.Microsoft Entra -> App Registration -> Roles
- Access your IdP's admin console and create a new SAML application. Set the redirect URI to the correct SP URL.
Contact Paperbox (SP):
- We will configure our SP with the IdP information.
- Conduct a test authentication to confirm the setup (given we have a test account).
- Check that user roles (
user
,admin
) are correctly assigned based on the SAML assertions.
Testing and Validation:
- Perform test logins to confirm SSO functionality.
- Ensure user attributes are accurately received and processed.
- Assign roles to your users.
Microsoft Entra -> Enterprise Apps -> Users and Groups
Conclusion
Integrating SAML SSO enhances user experience by streamlining access and improving security. Follow these steps to implement SAML authentication effectively in your Paperbox Workspace.