SAML Integration

SAML Integration

SAML Integration Overview 

Security Assertion Markup Language (SAML) is a standard for exchanging authentication and authorization data between an identity provider and a service provider (seoClarity). Currently available identity providers include Google, Microsoft, and Okta. Password Reset must be done on admin side if SAML is setup. seoClarity is not currently part of the InCommon Federation for metadata exchange. Support of signed and encrypted SAML assertions is based on the provider. 

  1. Note:  SSO validates against the user list managed within the organization but does not add users to the platform. Users would need to be added to the platform to allow access. SeoClarity users with admin rights have the ability to add users to the platform. 

Background & Requirements for SAML Integration

seoClarity supports SAML 2.0, as such please check that your IdP supports SAML 2.0. You need to create a SAML application with information we provide to you and provide your IdP configuration to us after you're setup. No additional attributes except for email address are needed. 

  1. Entity ID for SSO setup: SeoclaritySAML
    1. This is the same across all endpoints
  2. Email Domain(s): The domain(s) of the email addresses to have SAML enabled for. 
  3. ACS: (Assertion Consumer Service) URLs for SSO setup are:
    1. Production: ACS (SSO) URL: https://app.seoclarity.net/saml/sso 
    2. Development: ACS (SSO) URL: https://qa.seoclarity.net/saml/sso  

You can determine if you would like to enable access to other seoClarity environments by adding the below ACS URLs: 

 

SAML Application Setup 

1a) For most IdP configuration, you just need to setup an application with the above Entity ID and ACS URL (single sign on URL), and leave other fields as default.  After setup, you need to download the IdP metadata.xml and send it to our support team at support@seoclarity.net 


1b) If you don’t have IdP metadata.xml , please provide the following to support@seoclarity.net 

  1. SSO URL 
  2. Entity ID 
  3. Certificate of IdP server 

Google G-suite SAML

Using Google as an example, we need you to provide the SSO URL, Entity ID and Certificate or IdP metadata file. The IdP metadata file is simpler and highly recommended. More information on Google SAML can be found here.

 

1) Navigate to your Google G-suite admin page.  

 

 

2) Choose "SAML apps". Click on the "Plus" icon lower-right to add a new SAML app.

 
 

 

3) Choose "Setup my own custom app" at the bottom of the list. Choose "Option 2", download your IDP metadata. Send it to our DEV teams. 

 

 

 

4) Customize your application

  

 

 

 

 

 

5) Enter the ACS URL and Entity ID URLs that we provided into the form above.

 

 

5) Switch your new SAML App “ON for everyone”   


Okta SAML

1. Sign in to your Okta organization as a user with administrative privileges. If you don't have an Okta organization, you can create a free Okta Developer Edition organization via https://developer.okta.com/signup/ .

 

2. Click on Applications and then "Create App Integration":





3. A dialog box will appear, select SAML 2.0, and then click Next.

 


4. In the General Settings section, enter seoClarity SAML in the App name box, and then click Next 

 


5. In the Configure SAML section, enter the Single sign on URL and Audience URI (SP Entity ID) that we provided into the form above.  Click on "Show advanced settings" to open more configuration fields.



 


 

6. Click Next. 
 

7. In the Feedback section, select the This is an internal application that we created check box and click Finish. 

 


8. Copy the Identity. Provide the metadata link or download the file, you need to send this to the seoClarity Development team (dev@seoclarity.net) to integrate your SAML application. 

 

9. Right-click the People section of the Spring Security SAML application and select Open Link In New Tab (so that you can come back to the Sign On section later).


 


10. In the new tab that opens, click Assign Application. 


 



11. The Assign Spring Security SAML to up to 500 people dialog box appears. Enter your username into the search box, select the check box next to your username, and then click Next. 

 

12. You are prompted to enter user-specific attributes. Click Confirm Assignments to keep the defaults. 

 


    • Related Articles

    • Wordpress Integration

      Wordpress Integration The default integration in our settings allows for Wordpress and allows web pages in Wordpress to be created or updated via Content Fusion. Once the Wordpress Integration has been set up, you will be able to use it. Best ...
    • Adobe Analytics Integration

      Overview For Adobe Analytics integration, this article outlines the steps needed to run through in order to grant seoClarity access to your account. Adobe eVars (Conversion Variables) are not needed for the Partner Exchange integration. In the Adobe ...
    • Google Search Console Integration

      Google Search Console Integration Overview The objective of this integration is to authenticate a Google Search Console account within seoClarity. This integration takes the place of the previous Google Webmaster Tools integration. Background & ...
    • I'm Getting Google Search Console Integration Profile Warning Messages, What Do I Do?

      If you're seeing warning messages related to Google Search Console (GSC) profile integration, here's how to address them: Select the Right Profiles: Make sure to select the necessary profiles during integration. If the "+Add Profiles to track" option ...
    • Jira Integration

      Jira Integration The Workflow Integration setting allows for task management tools to be integrated into seoClarity tasks. This integration enables a two-way, real-time synch between seoClarity’s own task management system and the chosen third party ...