/
Single Sign On

Single Sign On

RapIDadmin supports single sign on through SAML 2.0. Setting up SSO may require help from your IT department or SAML identity provider (IdP) administrator.

How to enable SSO

The SSO administration settings are located in RapIDadmin and are available to users that are granted the RapIDadmin:Administration:Settings permission.

To access RapIDadmin select the user avatar > Switch Applications > RapIDadmin

Navigate to RapIDadmin > Administration > Settings to view the Sign Sign On settings.

Screenshot 2024-11-19 at 10.55.11 AM.png

All settings are required

Enable Single Sign On - This will enable the Sign Sign On feature for your account.

Default Tenant - Select the tenant that your users will be assigned to by default when they first log in. If there is an existing user with a matching email address, the tenant will not be updated for that user.

Identity Provider - Select SAML.

Metadata Document Url - This is a link to the metadata document that describes your identity provider settings. When you hit save, we will fetch this document to configure your connection.

Email Attribute - The URI of the email attribute found in the response from your IdP.

First Name Attribute - The URI of the first name attribute found in the response from your IdP.

Last Name Attribute - The URI of the last name attribute found in the response from your IdP.

Login Url - This is the URL that your users will navigate to in order to initiate the service provider-initiated login flow.

After you hit Save, you will see two values that you will need in order to configure your IdP

Signing Certificate - Your IdP will need the signing certificate to verify the signature of our SAML requests.

Callback Url - This is the URL that your IdP will use to redirect authenticated users along with their signed assertions.

 

 

Detailed Example of setup and testing with “Auth0”

RA Setup

  • Log into RapIDadmin

    • To access RapIDadmin select the user avatar > Switch Applications > RapIDadmin

  • Navigate to RapIDadmin > Administration > Settings to view the Sign Sign On settings.

image-20250401-165158.png
  • Check the Enable Single Signon Checkbox

  • For lines 1 and 2 of 6

    • Choose your Default Tenant (Click on Magnifying glass, then your Tenant)

    • Select “SAML” as the Identity Provider (IDP)

 

Auth0 (Idp) Setup

  • Follow the steps below in “Auth0 Idp Setup” (below) to get the Metadata document url from Auth0

NOTE: Replace “Auth0” (Idp) setup instructions with your Idp’s setup instructions here.

image-20250401-170549.png

 

  • Choose an Existing Application: Applications→Applications→<My TestSAML App>→Settings

  • or Create your own “Application” (“My TestSAML App” in this caase.)

image-20250401-171558.png

Skip the “QuickStart” tab and go to “Addons”

  • Switch tabs in Auth0 to “Addons”

    • Enable “SAML2 Web App”

image-20250401-180922.png

Copy the “Identity Provider Medadata” url from the usage tab of the “Addon: SAML2 Web App” by

  • Going to “Identity Provider Metadata:” (See screenshot below)

    • Hover over the “Download” link

image-20250401-200710.png
  • Then right clicking and click on “Copy Link address

image-20250401-201030.png
  • Copy to RA's “Metadata Document Url” in green box below

image-20250404-210926.png

NOTE: The “Download” link (Above) should have the word “Metadata” in it:

i.e.: https://vdstest.auth0.com/samlp/metadata/NcmaleogJudQ7O2RZa7z8CvHij325QwB

image-20250404-185215.png

Skip the “QuickStart” tab and go to “Settings”

image-20250401-173436.png
  • Scroll down to “Allowed Callback URL’s”

  • Switch back to RA and Copy the Login Url found in the RA settings to the "Allowed Callback URLs" setting in Auth0 (you can add multiple with a comma separator)

image-20250404-195347.png

 

image-20250404-193629.png

Save changes (In Auth0)

  •  

  •  

Scroll down to bottom and click “Enable”

image-20250401-183124.png

 

 

 

  • Applications→Applications→<My TestSAML App>→AddOns→SAML2 Web App→Settings

  • Update the callback url here also

  • Download the signing certificate from RA. Copy the text. Paste it between the "-----BEGIN CERTIFICATE-----\n" and "n-----END CERTIFICATE-----" markers in the "signingCert" property (near the bottom of the settings json)

Testing

  • Add some users to Auth0 (User Management→Users)

    • Make sure they have a first and last name added to their metadata in the Details section

    • There should be a few users already with examples

  • Then you should be able to log in to RA using the Login Url found in the RA settings

Related content