How can I configure SAML?
-
Sign in to your cipherscale space administration portal.
-
Navigate to Teams.
-
Select the Authentication tab.
-
Click SAML Configuration for additional configuration.
-
Set up cipherscale as a Service Provider (SP) in your Identity Provider (IdP). Use the configuration provided in the Cipherscale Metadata section.
-
The Cipherscale Metadata section provides the Protocol, SP Authentication URL, Valid Redirect URI, and Issuer Name needed for the configuration.
-
If your IdP accepts a metadata file for configuration, click Download Metadata and use the downloaded file for your configuration
-
-
Optionally, customize the label of the authentication button that will appear for users to authenticate with the IdP.
-
Provide the metadata needed for cipherscale to communicate with the IdP in the Identity Provider Metadata section
-
Enter an IdP Name
-
Select one of the three methods to provide the metadata:
-
For Metadata URL, provide the URL in the field below.
-
For Metadata XML, copy-paste the XML in the field below.
-
For Manual Configuration, provide the IdP Authentication Endpoint and copy-paste the IdP X.509 Public Certificate.
-
-
-
In the Connection section:
-
Select either POST or REDIRECT for the Data Binding Method
-
Change the Maximum Authentication Lifetime if needed.
-
Optionally, enter a Logout URL.
-
-
In the Reconnecting to Cipherscale section, select whether the existing session with the IdP should be reused or a new session should be started.
-
In the Send AuthnContexts section, configure the allowed authentication methods.
-
Toggle the switch to enable/disable sending contexts
-
From the AuthnContexts drop-down, select one or more values: PasswordProtectedTransport, X509, Paswordless, Kerberos, TLSClient
-
Click + Add custom value to add AuthContext values not in the list.
-
-
Click Next to view the Attribute Mapping section.
-
In the User attribute mapping section, provide the attributes defined in your IdP that should correspond to cipherscale values for a User’s Group, Email, Firstname, and Lastname.
-
If you want to automatically update user groups based on group mapping rules every time a user signs in, turn ON the User group sync from IdP toggle switch.
-
In the User group mapping rules section, add rules to map the value sent in the SAML IdP user group to a corresponding value in the cipherscale group.
-
In the Unmapped SAML IdP user groups section, select a cipherscale user group to which users are assigned when a mapping rule for the IdP user group cannot be found.
-
Click Next
-
Cipherscale will now try to use the metadata provided for the IdP. If successful, you will return to the Authentication tab.