Pre-requisites for signing in via Auth0 SSO
Following are the pre-requisites to configure Auth0 SSO
- Identity Provider Single Sign-On URL
- X.509 Certificate
- issuer ID
Follow the steps given below to retrieve the information mentioned above.
Steps to configure SAML-based SSO
- Sign in to saner.secpod.com
- Go to Control Panel
- Under Settings, select SSO Authentication
4 Click on Download SSO metadata file
5 Open the downloaded metadata file from your browser or a text editor.
Copy and save the Entity ID and ACS URL from the metadata file you downloaded.
Sign in to your organization’s Auth0 Admin Console.
Click Applications in the left menu, then click on Applications.
Click Create Applications, select Regular Web Applications, enter the name for the application (SanerNow App) and click on Create.
Once the app is created, click on App and select settings
Scroll down and under Application URIs, enter the metadata of Saner CVEM under Alert Call Back URLs
Scroll down and click on Save Changes.
Go to Add-ons and click on SAML2 webapp.
Download the metadata file and Auth0 certificate file under Usage.
Select Settings, add SanerNow metadata under Application Call back URL
Under Settings, add the following JSON
{
"mappings": {
"email": "Email"
},
"nameIdentifierFormat": "urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress"
}
Click on Save
Enable the SAML2 Web app under add-ons
Copy the Identity Provider Single Sign-On URL and identity provider issuer and the X.509 Certificate from the downloaded metadata and certificate file.
Return to the SSO authentication page in Saner CVEM
Configure SSO in Saner CVEM using the downloaded certificate and copied URLs from Auth0 by following the steps given below:
Under SSO Authentication, click on new SSO policy.
Enter Issuer ID, SSO URL and Certificate from Auth0.
Specify the required name and description for the SSO policy
Enable signed authentication if you have configured it in Auth0
Click on Create
Steps to Assign users to the app in Auth0
Go to Applications and select the Applications created (SanerNow App)
Under Connections, enable the database for the users you need access to.
Assign SSO policy to Saner CVEM Users
Note: Before assigning the users, ensure that the User login ID in Saner CVEM matches with Auth0 Username
Go to Control Panel. Click on Users.
Select the users to whom Auth0 policy should be applied
Under Actions, select “Enforce SSO authentication” button
Select the Auth0 policy from the drop-down
Click on Confirm
How to apply SSO Policy to the New Saner CVEM user
How to apply SSO Policy to the New Saner CVEM user
Step 1: Log in to Saner CVEM and then click Control Panel at the top-right to access the Control Panel page.
Step 2: All Organizations are selected from the drop-down by default on the control panel page. If the admin has created only one organization, the page will automatically select that organization and show its accounts.
Step 3: Click the Users section in the Control Panel.
Step 4: Click New User on the top right corner of the Users page.
Step 5: Specify the Login Id, Name, Organization, and Password.
Step 6: Select the role of the user from the drop-down menu.
Step 7: Select the managing organizations from the drop-down menu
Step 8: To assign SSO Policy to the user, select the created SSO policy from the drop-down.
Step 9: Click the Create button to apply SSO policy to the new user
Test the SAML configuration
Test if the configuration is working properly using the following steps
Via SP-initiated flow:
Go to Saner CVEM sign-in page.
Enter your email address and click Next. You will be redirected to Auth0 for authentication.
If you have not already signed in to Auth0, enter your Auth0 credentials to sign in. You will be automatically redirected back to Saner CVEM and will be signed in.
Via IdP-initiated flow:
Sign in to Auth0 end-user dashboard.
Click on the SAML app (Saner CVEM app) you have configured for Saner You will be redirected to Saner and will be signed in.
Was this article helpful?
That’s Great!
Thank you for your feedback
Sorry! We couldn't be helpful
Thank you for your feedback
Feedback sent
We appreciate your effort and will try to fix the article