Setting up SAML SSO with OneLogin as the Provider
- Sign up for https://www.onelogin.com/ use their trial version.
- go to https://xxxxx.onelogin.com/apps
- click add app
Go to the configuration tab of your app settings
- Fill in ACS (Consumer) URL Validator with ^https:\/\/<your-subdomain>\.mobilize\.io\/users\/auth\/saml\/callback$ replace <your-subdomain> with your actually subdomain
- Fill in ACS (Consumer) URL with https://<your-subdomain>.mobilize.io/users/auth/saml/callback replace <your-subdomain> with your actually subdomain
- Fill in Login URL with https://<your-subdomain>.mobilize.io/users/auth/saml replace <your-subdomain> with your actually subdomain
Note: These domains must be linked to your community's current domain. If your domain updates or if you are using a custom domain- the new domain must be reflected here.
Go to the Parameters tab
- Add a field called email. Click it. Select its value to be Email
Go to the Privileges tab
- Use Add new user to add the user you registered with to OneLogin, make sure that if this email isn’t in your community, to invite that email to your group.
Save your app settings
Go to SSO tab in the settings menu
- Copy Issuer URL and SAML 2.0 Endpoint (you will be using this later in the Mobilize Setup)
- On this page click View Details under X.509 Certificate
- Copy Fingerprint
----
Once you have added your app in Onelogin, head into Mobilize as the Account Manager
Mobilize Setup
- Go to Community settings -> Authentication
- Enable SSO, Chose SAML Configuration
- Fill in Metadata URL with Issuer URL
- Fill in SSO Target URL with SAML 2.0 Endpoint
- Fill in Certificate Fingerprint ID with Fingerprint
- Click Save
Comments
0 comments
Please sign in to leave a comment.