In this article, we will be walking you through setting up SAML SSO through Auth0 as an identity provider. Some
- Go to Dashboard > Applications
- Click the + Create Application button in the upper right
- Select Regular Web Applications then click the Create button
- In the Settings tab, click in the Name field, enter a name like Mobilize SSO or Mobilize SAML
- Scroll down to Application URIs
- In Application Login URI enter https://<mobilizeDomain>.mobilize.io/users/auth/saml
- In Allowed Callback URLs enter https://<mobilizeDomain>.mobilize.io/users/auth/saml/callback *If using a custom domain, https://<community URL>/users/auth/saml and https://<community URL>/users/auth/saml/callback should be used
- Continue scrolling and click on Advanced Settings then choose Certificates
Copy the Signing Certificate Fingerprint and add it to the Mobilize Certificate Fingerprint ID field
- Next, choose Endpoints
Copy the SAML Protocol URL and the Metadata URL and paste this within Mobilize as well
- Scroll back up to the top of the page and choose Addons
- Click on SAML2 Web App (*BUT DO NOT TOGGLE TO ACTIVATE)
- Copy the Issuer (starts with URN:)
- Choose the Settings tab (next to the Usage tab), scroll to the bottom, and click Save
Note: Some admins have found this link from Auth0 helpful - https://auth0.com/docs/authenticate/protocols/saml/saml-configuration/customize-saml-assertions.
In Mobilize (from above)
- Paste the Issuer (starts with URN:) in the Mobilize Metadata URL field
- Paste the SAML Protocol URL in the Mobilize SSO Target URL field
- Paste the Signing Certificate Fingerprint in the Mobilize Certificate Fingerprint ID field
Comments
0 comments
Please sign in to leave a comment.