Skip to content

Update app saml addon instructions #8562

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
wants to merge 3 commits into
base: master
Choose a base branch
from
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
7 changes: 7 additions & 0 deletions articles/protocols/saml/saml-apps/_configure-saml-addon.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,7 @@
## Configure the SAML2 Web App addon

1. Login to [Auth0 dashboard](${manage_url}) and create a new [Application](${manage_url}/#/applications).
2. Give the new application a meaningful name, like "${saml_app_name}". For this tutorial we'll chooose the "Regular Web App" type, but you can choose any of them.
3. Navigate to the **Addons** tab.
4. Enable the **SAML2 Web App** addon using the toggle switch.
5. In the **Settings** window, set the following values:
5 changes: 0 additions & 5 deletions articles/protocols/saml/saml-apps/_header.md

This file was deleted.

15 changes: 12 additions & 3 deletions articles/protocols/saml/saml-apps/cisco-webex.md
Original file line number Diff line number Diff line change
@@ -1,18 +1,27 @@
---
title: Cisco WebEx SAML Configuration
description: Cisco WebEx SAML Configuration
title: Configure Auth0 as a SAML Identity Provider for Cisco WebEx
description: Learn how to configure Auth0 to be a SAML Identity Provider for a Cisco WebEx.
topics:
- saml
- identity-providers
- cisco
- cisco-webex
- webex
contentType:
- how-to
useCase:
- add-idp
---

<%= include('./_header') %>
# Configure Auth0 as a SAML Identity Provider for Cisco WebEx

On this page, you'll find steps on configuring Auth0 to serve as a SAML Identity Provider for [Cisco WebEx](https://www.webex.com/).

<%= include('./_configure-saml-addon.md', {
saml_app_name: "CiscoWebEx"
}) %>

- **Settings (JSON):**

```json
{
Expand Down
19 changes: 13 additions & 6 deletions articles/protocols/saml/saml-apps/datadog.md
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
---
title: Datadog SAML Configuration
description: Datadog SAML Configuration
title: Configure Auth0 as a SAML Identity Provider for Datadog
description: Learn how to configure Auth0 to be a SAML Identity Provider for a Datadog.
topics:
- saml
- identity-providers
Expand All @@ -11,7 +11,16 @@ useCase:
- add-idp
---

<%= include('./_header') %>
# Configure Auth0 as a SAML Identity Provider for Datadog

On this page, you'll find steps on configuring Auth0 as a SAML Identity Provider for [Datadog](https://www.datadoghq.com/).

<%= include('./_configure-saml-addon', {
saml_app_name: "Datadog"
}) %>

- **Application Callback URL:** `https://app.datadoghq.com/account/saml/assertion`
- **Settings (JSON):**

```json
{
Expand All @@ -29,6 +38,4 @@ useCase:
}
```

The **<dfn data-key="callback">Callback URL</dfn>** is `https://app.datadoghq.com/account/saml/assertion`.

Notice that Datadog has an option to automatically provision new users. Check [Datadog docs](http://docs.datadoghq.com/guides/saml/) for more details.
Datadog has an option to automatically provision new users. Check out [Datadog docs](http://docs.datadoghq.com/guides/saml/) for more details.
16 changes: 11 additions & 5 deletions articles/protocols/saml/saml-apps/egencia.md
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
---
title: Egencia SAML Configuration
description: Egencia SAML Configuration
title: Configure Auth0 as a SAML Identity Provider for Egencia
description: Learn how to configure Auth0 to be a SAML Identity Provider for Egencia.
topics:
- saml
- identity-providers
Expand All @@ -11,8 +11,16 @@ useCase:
- add-idp
---

<%= include('./_header') %>
# Configure Auth0 as a SAML Identity Provider for Egencia

On this page, you'll find steps on configuring Auth0 as a SAML Identity Provider for [Egencia](https://www.egencia.com/).

<%= include('./_configure-saml-addon', {
saml_app_name: "Egencia"
}) %>

- **Application Callback URL:** `https://www.egencia.com/auth/v1/artifactConsumer`
- **Settings (JSON):**

```json
{
Expand All @@ -29,5 +37,3 @@ useCase:
],
}
```

The **<dfn data-key="callback">Callback URL</dfn>** is `https://www.egencia.com/auth/v1/artifactConsumer`.
16 changes: 11 additions & 5 deletions articles/protocols/saml/saml-apps/eloqua.md
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
---
title: Eloqua (Oracle Eloqua Marketing Cloud) SAML Configuration
description: Eloqua (Oracle Eloqua Marketing Cloud) SAML Configuration
title: Configure Auth0 as a SAML Identity Provider for Eloqua
description: Learn how to configure Auth0 to be a SAML Identity Provider for Eloqua (Oracle Eloqua Marketing Cloud).
topics:
- saml
- identity-providers
Expand All @@ -11,8 +11,16 @@ useCase:
- add-idp
---

<%= include('./_header') %>
# Configure Auth0 as a SAML Identity Provider for Eloqua

On this page, you'll find steps on configuring Auth0 as a SAML Identity Provider for [Eloqua (Oracle Eloqua Marketing Cloud)]().

<%= include('./_configure-saml-addon', {
saml_app_name: "Eloqua"
}) %>

- **Application Callback URL:** `https://login.eloqua.com/auth/saml2/acs`
- **Settings (JSON):**

```json
{
Expand All @@ -32,8 +40,6 @@ useCase:

```

The **<dfn data-key="callback">Callback URL</dfn>** is `https://login.eloqua.com/auth/saml2/acs`.

::: note
The Service Provider Entity URL copied from within the IDP settings in Eloqua to set the audience restriction within Auth0.
:::
19 changes: 13 additions & 6 deletions articles/protocols/saml/saml-apps/freshdesk.md
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
---
title: Freshdesk SAML Configuration
description: Freshdesk SAML Configuration
title: Configure Auth0 as a SAML Identity Provider for Freshdesk
description: Learn how to configure Auth0 to be a SAML Identity Provider for Freshdesk.
topics:
- saml
- identity-providers
Expand All @@ -11,11 +11,20 @@ useCase:
- add-idp
---

<%= include('./_header') %>
# Configure Auth0 as a SAML Identity Provider for Freshdesk

On this page, you'll find steps on configuring Auth0 as a SAML Identity Provider for [Freshdesk](https://freshdesk.com/).

<%= include('./_configure-saml-addon', {
saml_app_name: "Freshdesk"
}) %>

- **Application Callback URL:** `https://<YOUR_FRESHDESK_DOMAIN>.freshdesk.com/login/saml`
- **Settings (JSON):**

```json
{
"audience": "https://{FD Domain}.freshdesk.com",
"audience": "https://<YOUR_FRESHDESK_DOMAIN>.freshdesk.com",
"mappings": {
"email": "http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress",
"given_name": "User.FirstName",
Expand All @@ -31,5 +40,3 @@ useCase:
]
}
```

The **<dfn data-key="callback">Callback URL</dfn>** is `https://{FD Domain}.freshdesk.com/login/saml`.
3 changes: 2 additions & 1 deletion articles/protocols/saml/saml-apps/github-cloud.md
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
---
title: Configure Auth0 as Identity Provider for GitHub Enterprise Cloud
description: This page explains how to configure Auth0 to be the SAML Identity Provider for a GitHub Enterprise Cloud (github.com) organization.
description: Learn how to configure Auth0 to be the SAML Identity Provider for a GitHub Enterprise Cloud (github.com) organization.
topics:
- saml
- identity-providers
Expand Down Expand Up @@ -72,6 +72,7 @@ As an example, if you want `nickname` as the Name Identifier, the `mappings` sec
```

## Configure SAML Single Sign-On on GitHub

Follow the instruction from GitHub's [Enabling and testing SAML Single Sign-on (SSO) for your organization](https://help.github.com/en/articles/enabling-and-testing-saml-single-sign-on-for-your-organization) to complete the configuration on GitHub Enterprise Cloud. You will need the following information:

* **Sign On URL** (for step 6): `https://${account.namespace}/samlp/{CLIENT_ID}`
Expand Down
16 changes: 12 additions & 4 deletions articles/protocols/saml/saml-apps/google-apps.md
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
---
title: G Suite SAML Configuration
description: G Suite SAML Configuration
title: Configure Auth0 as a SAML Identity Provider for G Suite
description: Learn how to configure Auth0 to be a SAML Identity Provider for G Suite.
topics:
- saml
- identity-providers
Expand All @@ -11,7 +11,16 @@ useCase:
- add-idp
---

<%= include('./_header') %>
# Configure Auth0 as a SAML Identity Provider for G Suite

On this page, you'll find steps on configuring Auth0 as a SAML Identity Provider for [G Suite](https://gsuite.google.com/).

<%= include('./_configure-saml-addon', {
saml_app_name: "GSuite"
}) %>

- **Application Callback URL:** `https://www.google.com/a/{YOUR-GOOGLE-DOMAIN}/acs`
- **Settings (JSON):**

```json
{
Expand All @@ -32,4 +41,3 @@ useCase:
}
```

The **<dfn data-key="callback">Callback URL</dfn>** is `https://www.google.com/a/{YOUR-GOOGLE-DOMAIN}/acs`.
17 changes: 12 additions & 5 deletions articles/protocols/saml/saml-apps/hosted-graphite.md
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
---
title: Hosted Graphite SAML Configuration
description: Hosted Graphite SAML Configuration
title: Configure Auth0 as a SAML Identity Provider for Hosted Graphite
description: Learn how to configure Auth0 to be a SAML Identity Provider for Hosted Graphite.
topics:
- saml
- identity-providers
Expand All @@ -11,7 +11,16 @@ useCase:
- add-idp
---

<%= include('./_header') %>
# Configure Auth0 as a SAML Identity Provider for Hosted Graphite

On this page, you'll find steps on configuring Auth0 as a SAML Identity Provider for [Hosted Graphite](https://www.hostedgraphite.com/).

<%= include('./_configure-saml-addon', {
saml_app_name: "HostedGraphite"
}) %>

- **Application Callback URL:** `https://www.hostedgraphite.com/complete/saml/<YOUR-USER-ID>/`
- **Settings (JSON):**

```json
{
Expand All @@ -22,5 +31,3 @@ useCase:
]
}
```

The **<dfn data-key="callback">Callback URL</dfn>** is `https://www.hostedgraphite.com/complete/saml/{YOUR-USER-ID}/`.
21 changes: 14 additions & 7 deletions articles/protocols/saml/saml-apps/litmos.md
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
---
title: Litmos SAML Configuration
description: Litmos SAML Configuration
title: Configure Auth0 as a SAML Identity Provider for Litmos
description: Learn how to configure Auth0 to be a SAML Identity Provider for Litmos.
topics:
- saml
- identity-providers
Expand All @@ -10,8 +10,17 @@ contentType:
useCase:
- add-idp
---
<!-- markdownlint-disable MD002 MD041 -->
<%= include('./_header') %>

# Configure Auth0 as a SAML Identity Provider for Litmos

On this page, you'll find steps on configuring Auth0 as a SAML Identity Provider for [Litmos](https://www.litmos.com/).

<%= include('./_configure-saml-addon', {
saml_app_name: "Litmos"
}) %>

- **Application Callback URL:** `https://<YOUR_LITMOS_DOMAIN>.litmos.com/integration/samllogin`
- **Settings (JSON):**

```json
{
Expand All @@ -27,7 +36,7 @@ useCase:
"mapIdentities": false,
"signatureAlgorithm": "rsa-sha1",
"digestAlgorithm": "sha1",
"destination": "https://{YOUR DOMAIN}.litmos.com/integration/samllogin",
"destination": "https://<YOUR_LITMOS_DOMAIN>.litmos.com/integration/samllogin",
"lifetimeInSeconds": 3600,
"signResponse": false,
"nameIdentifierFormat": "urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress",
Expand All @@ -37,8 +46,6 @@ useCase:
}
```

The **<dfn data-key="callback">Callback URL</dfn>** is `https://{YOUR DOMAIN}.litmos.com/integration/samllogin`.

## Sample SAML

```xml
Expand Down
18 changes: 12 additions & 6 deletions articles/protocols/saml/saml-apps/pluralsight.md
Original file line number Diff line number Diff line change
@@ -1,18 +1,26 @@
---
title: Pluralsight SAML Configuration
description: Pluralsight SAML Configuration
title: Configure Auth0 as a SAML Identity Provider for Pluralsight
description: Learn how to configure Auth0 to be a SAML Identity Provider for Pluralsight.
topics:
- saml
- identity-providers
- pluralsight
- Pluralsight
contentType:
- how-to
useCase:
- add-idp
---

<%= include('./_header') %>
# Configure Auth0 as a SAML Identity Provider for Pluralsight

On this page, you'll find steps on configuring Auth0 as a SAML Identity Provider for [Pluralsight](https://www.pluralsight.com/).

<%= include('./_configure-saml-addon', {
saml_app_name: "Pluralsight"
}) %>

- **Application Callback URL:** `https://prod-pf.pluralsight.com/sp/ACS.saml2`
- **Settings (JSON):**

```json
{
Expand All @@ -33,5 +41,3 @@ useCase:
]
}
```

The **<dfn data-key="callback">Callback URL</dfn>** is `https://prod-pf.pluralsight.com/sp/ACS.saml2`.
16 changes: 12 additions & 4 deletions articles/protocols/saml/saml-apps/sprout-video.md
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
---
title: Sprout Video SAML Configuration
description: Sprout Video SAML Configuration
title: Configure Auth0 as a SAML Identity Provider for Sprout Video
description: Learn how to configure Auth0 to be a SAML Identity Provider for Sprout Video.
topics:
- saml
- identity-providers
Expand All @@ -11,11 +11,19 @@ useCase:
- add-idp
---

<%= include('./_header') %>
# Configure Auth0 as a SAML Identity Provider for Sprout Video

On this page, you'll find steps on configuring Auth0 as a SAML Identity Provider for [Sprout Video](https://sproutvideo.com/).

<%= include('./_configure-saml-addon', {
saml_app_name: "SproutVideo"
}) %>

- **Settings (JSON):**

```json
{
"audience": "https://{YOUR SPROUT VIDEO ACCOUNT}.vids.io",
"audience": "https://{YOUR_SPROUT_VIDEO_ACCOUNT}.vids.io",
"mappings": {
"user_id": "http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameidentifier",
"email": "http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress",
Expand Down
Loading