OneLogin

circle-check

Single Sign-On (SSO) is an authentication process that allows users to access multiple applications or systems with one set of login credentials. In this article, we will cover how to configure SSO using the SAML 2.0 standard protocol with OneLogin.


Retrieve SSO SAML identifiers

To start, your organization needs to retrieve the SSO SAML identifiers from the Didomi console to continue setup in your identity provider.

Click My organization and selecting Single Sign-on from the drop-down menu.

Use the provided fields in the Get your SSO SAML identifiers step to record the following:

Identifier
Description

Configured issuer

Your organization's identity provider's unique identifier within the Didomi console.

Login URL

Where user will be redirected after successful login on the identity provider.

Logout URL

Where user will be redirected after successful logout on the identity provider.

Click Continue when finished.

Create Didomi console app in OneLogin

Navigate to the Administration section of your organization's OneLogin portal and navigate to the following:

  1. Select Applications > Applications.

  2. Click Add App.

  3. Search for SAML Custom Connector (Advanced) and select it from the list.

  4. For the Display Name field, enter a name for your new application that is recognizable as being for the Didomi console (e.g. Didomi Console). This is where your organization will configure the SSO SAML.

  5. Click Save when finished.

A new app will be created in your OneLogin account.

Configure Didomi console app in OneLogin

From your newly created Didomi console app in One Login, navigate to the Configuration tab on the left-hand panel.

Use the provided fields to input the following values:

circle-info

Some values are retrieved from the Didomi SSO SAML identifiers.

OneLogin field
Values

Audience (EntityID)

Configured issuer

ACS (Consumer) URL Validator

[-a-zA-Z0-9@:%.\+~#=]{2,256}\.[a-z]{2,6}\b([-a-zA-Z0-9@:%\+.~#?&//=]*)

ACS (Consumer) URL

Login URL

Single Logout URL

Logout URL

SAML initiator

Service Provider

Next, click Parameters from the left-hand panel and click + inline with the SAML Custom Connector (Advanced Field) header.

In the subsequent modal:

  1. Input http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress in the Field name field.

  2. Select Email in the Value field.

  3. Enable the checkbox for Include in SAML assertion and click Save.

Retrieve OneLogin metadata

From your newly created Didomi console app in One Login, navigate to the SSO tab on the left-hand panel. Record the values for the following fields (collectively Didomi refers to these values as metadata):

  • X.509 Certificate (under View Details)

  • SAML 2.0 Endpoint (HTTP)

  • SLO Endpoint (HTTP)

Add OneLogin metadata

With the metadata from OneLogin copied, navigate back to the SSO configuration within the Didomi console and input those values in the provided fields for the Setup SSO settings step.

Didomi metadata
Google values

X509 certificate

X.509 certificate

Login URL

SAML 2.0 Endpoint (HTTP)

Logout URL

SLO Endpoint (HTTP)

Test and complete SSO configuration

Didomi will verify the identity provider metadata. When successful, utilize the Domain(s) field to add email domains to which the SAML authentication will be restricted (i.e. only users whose emails have this domain will be allowed to login with SSO SAML).

circle-exclamation

Click Save settings.

Assign user access

Navigate to the Administration section of your organization's OneLogin portal and navigate to Users > Users.

Follow the instructions to assign users to the Didomi console application created in OneLogin.

Last updated