Security Assertion Markup Language (SAML) is a standard for exchanging authentication and authorization data between an identity provider and a service provider (seoClarity). Currently available identity providers include Google, Microsoft, and Okta. Password Reset must be done on admin side if SAML is setup. seoClarity is not currently part of the InCommon Federation for metadata exchange. Support of signed and encrypted SAML assertions is based on the provider.
seoClarity supports SAML 2.0, as such please check that your IdP supports SAML 2.0. You need to create a SAML application with information we provide to you and provide your IdP configuration to us after you're setup. No additional attributes except for email address are needed.
You can determine if you would like to enable access to other seoClarity environments by adding the below ACS URLs:
1a) For most IdP configuration, you just need to setup an application with the above Entity ID and ACS URL (single sign on URL), and leave other fields as default. After setup, you need to download the IdP metadata.xml and send it to our support team at support@seoclarity.net
1b) If you don’t have IdP metadata.xml , please provide the following to support@seoclarity.net :
Using Google as an example, we need you to provide the SSO URL, Entity ID and Certificate or IdP metadata file. The IdP metadata file is simpler and highly recommended. More information on Google SAML can be found here.
1) Navigate to your Google G-suite admin page.
2) Choose "SAML apps". Click on the "Plus" icon lower-right to add a new SAML app.
3) Choose "Setup my own custom app" at the bottom of the list. Choose "Option 2", download your IDP metadata. Send it to our DEV teams.
4) Customize your application
5) Enter the ACS URL and Entity ID URLs that we provided into the form above.
5) Switch your new SAML App “ON for everyone”
1. Sign in to your Okta organization as a user with administrative privileges. If you don't have an Okta organization, you can create a free Okta Developer Edition organization via https://developer.okta.com/signup/ .
2. Click on Applications and then "Create App Integration":
6. Click Next.
7. In the Feedback section, select the This is an internal application that we created check box and click Finish.
9. Right-click the People section of the Spring Security SAML application and select Open Link In New Tab (so that you can come back to the Sign On section later).
10. In the new tab that opens, click Assign Application.
11. The Assign Spring Security SAML to up to 500 people dialog box appears. Enter your username into the search box, select the check box next to your username, and then click Next.
12. You are prompted to enter user-specific attributes. Click Confirm Assignments to keep the defaults.