Single Sign On: How to Enable SSO With RapIDadmin
Purpose:
This document will walk you through how to enable single sign on to use with RapIDadmin
RapIDadmin supports single sign on through SAML 2.0.
Setting up SSO may require help from your IT department or SAML identity provider (IdP) administrator.
Definitions:
RA: RapIDadmin
SSO: Single Sign On
SAML: Security Assertion Markup Language. An open standard for exchanging authentication and authorization data between two parties
IdP: Identity Provider
Process:
Log into RapIDadmin as a Customer (Tenant Admin)
To access RapIDadmin select the user avatar > Switch Applications > RapIDadmin
Make sure under “Roles” that a “Default Role” is set.
Navigate to Roles | <Choose your role> | Actions | Edit | Default
This is the role that will get assigned to the SSO User upon first login.
Navigate to RapIDadmin > Administration > Settings to view the Sign Sign On settings (Please reach out to support at Vision Database if you do not see the tab for Single Sign On)
Check the Enable Single Sign On Checkbox
For lines 1 and 2 of 6
Choose your Default Tenant (Click on Magnifying glass, then your Tenant)
Select “SAML” as the Identity Provider (IdP)
Auth0 (IdP) Setup
Follow the steps below in “Auth0 IdP Setup” (below) to get the Metadata document URL from Auth0
NOTE: Replace “Auth0” (IdP) setup instructions with your IdP’s setup instructions here.
Login or Sign up to Auth0: https://manage.auth0.com
Choose an Existing Application: Applications→Applications→<My TestSAML App>→Settings
Or Create your own “Application” (“My TestSAML App” in this case.)
Skip the “QuickStart” tab and go to “Addons”
Switch tabs in Auth0 to “Addons”
Enable “SAML2 Web App”
Copy the “Identity Provider Metadata” URL from the usage tab of the “Addon: SAML2 Web App” by
Going to “Identity Provider Metadata:” (See screenshot below)
Hover over the “Download” link
Then right clicking and click on “Copy Link address”
Copy to RA's “Metadata Document URL” in green box below
NOTE: The “Download” link (Above) should have the word “Metadata” in it:
i.e.: https://vdstest.auth0.com/samlp/metadata/NcmaleogJudQ7O2RZa7z8CvHij325QwB
Copy the Email, First Name, Last Name Attributes from Auth0 to RA:
Auth0: Switch from “Usage” tab to “Settings” tab.
Auth0: Applications→Applications→<My TestSAML App>→AddOns→SAML2 Web App→Settings
under the “Settings” Black Command window:
Copy the http links for email, given_name, family_name (From lines 6,8,9 in screenshot below) to the last 3 textboxes in RA (Screenshot above).
Shortcut: They look like the the following static preconfigured attributes:
(You can just paste from here: next 3 lines in blue)
Email Attribute — http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress
First Name Attribute — http://schemas.xmlsoap.org/ws/2005/05/identity/claims/givenname
Last Name Attribute — http://schemas.xmlsoap.org/ws/2005/05/identity/claims/surname
Click “SAVE ALL” in RA (See screenshot below)
This will create the “Signing Certificate” and “Callback URL”
Copy the “CallBack URL” from RA to “Application Callback URL” in Auth0 (Settings Tab)
After pasting, scroll to bottom and click on “Enable” then click the “X” at top right to close.
Signing Certificate in RA
Copy the following into the black “Settings” box above:
{ "mappings": { "user_id": "http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameidentifier", "email": "http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress" }, "createUpnClaim": true, "passthroughClaimsWithNoMapping": true, "mapUnknownClaimsAsIs": false, "mapIdentities": true, "signatureAlgorithm": "rsa-sha256", "digestAlgorithm": "sha256", "lifetimeInSeconds": 3600, "signResponse": false, "typedAttributes": true, "includeAttributeNameFormat": true, "nameIdentifierFormat": "urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified", "nameIdentifierProbes": [ "http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameidentifier", "http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress", "http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name" ], "authnContextClassRef": "urn:oasis:names:tc:SAML:2.0:ac:classes:unspecified", "logout": { "callback": "http://foo/logout", "slo_enabled": false }, "binding": "urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST", "signingCert": "-----BEGIN CERTIFICATE-----\n\n-----END CERTIFICATE-----" }
Download the signing certificate from RA.
Copy the contents of “signing.cer” from the downloads directory
Paste it between the "-----BEGIN CERTIFICATE-----\n" and "n-----END CERTIFICATE-----" markers in the "signingCert" property (near the bottom of the settings json)
Scroll down to bottom and click “Enable” (Will say “Save” if looking at it a second time)
Click the “X” at top right to close the “Addon: SAML2 Web App” dialog box.
Paste the “Callback URL to “Allowed Callback URLs” in Auth0
Click “Settings” (Next to QuickStart, not settings tab above)
Applications→Applications→<My TestSAML App>→Settings
Scroll down to “Allowed Callback URLs”
Paste to the "Allowed Callback URLs" setting in Auth0 (you can add multiple with a comma separator)
NOTE: it was already here by default
Testing
Add some users to Auth0 (User Management→Users)
Make sure they have a first and last name added to their metadata in the Details section
Add “givenname” and “surname” to Metadata as follows:
{ "givenname": "(FirstName)", "surname":"(LastName)" }
Then you should be able to log in to RA using the Login URL found in the RA settings
Administration | Settings | Single Sign On | Login URL
i.e. https://www.vdsapps.com/rapidadmin/account/SSOlogin/26f15d4d-917b-4773-80a4-2dd7d9e2abd9