Configure SAML SSO overview

circle-check

Single Sign-On (SSO) is an authentication process that allows users to access multiple applications or systems with one set of login credentials. In this article, we will provide a general overview for how to configure SSO using the SAML 2.0 standard protocol.

circle-info

For your convenience, Didomi offers dedicated resources for the following identity providers

If your organization's identity provider is not on the above list please continue with the instructions presented below.


SP-initiated vs IdP-initiated

SSO can either be initiated from the Service Provider (SP-initiated SSO) or initiated from the Identity Provider (IdP-initiated SSO).

Initiation
Description

SP-initiated SSO

Starts at the Service Provider (SP) when the user attempts access to a specific application.

IdP-initiated SSO

Starts at the Identity Provider (IdP) and is oftentimes a centralized dashboard or portal from which which the user selects the application to access.

The Didomi SAML SSO solution is SP-initiated. Ensure that this initiation is reflected accordingly in your organization's identity provider (i.e. your organization's IdP may ask you to provide this configuration).

Retrieve SSO SAML identifiers

To start, your organization needs to retrieve the SSO SAML identifiers from the Didomi console to continue setup in your identity provider.

Click My organization and selecting Single Sign-on from the drop-down menu.

Use the provided fields in the Get your SSO SAML identifiers step to record the following:

Identifiwer
Description

Configured issuer

Your organization's identity provider's unique identifier within the Didomi console.

Login URL

Where user will be redirected after successful login on the identity provider.

Logout URL

Where user will be redirected after successful logout on the identity provider.

Click Continue when finished.

Configure identity provider

With your organization's copied SSO SAML identifiers from the Didomi console, navigate to your identity provider and input the values in the corresponding fields.

When finished, locate where your organization configures the email claim with the identity provider and configure the following:

circle-exclamation

Name

http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress

Name format

URI Reference

Value

user.email

Retrieve identity provider metadata

Once the configuration within the identity provider is complete, locate the following metadata and copy the values:

Metadata
Description

X509 certificate

The SAML Signing Certificate from your identity provider in CER base64 format.

Login URL

Sign In (or login) URL from your identity provider.

Logout URL

Logout URL from your identity provider.

Note: This field may be optional for some identity providers. In this case the Login URL will be used instead.

Add identity provider metadata

With the metadata from your identity provider copied, navigate back to the SSO configuration within the Didomi console and input those values in the provided fields for the Setup SSO settings step.

Click Continue when finished.

Test and complete SSO configuration

Didomi will verify the identity provider metadata. When successful, utilize the Domain(s) field to add email domains to which the SAML authentication will be restricted (i.e. only users whose emails have this domain will be allowed to login with SSO SAML).

circle-exclamation

Click Save settings.

When finished, follow your identity provider's instructions on managing a user's access to the Didomi console application.

Last updated