SAML SSO Configuration
Introduction
Triage Private Cloud supports SAML authentication to enable SSO for your organization. This document describes the steps required to enable SAML authentication.
Only Service Provider (SP) initiated SSO is supported. IdP initiated SSO will fail.
1. Request SAML SSO
Contact [email protected] mentioning:
- Your Identity Provider (IdP) (e.g.
Okta
,Azure
,Google
) - Which (if any) email domains you would like automatically redirected to your SSO (
like:
@recordedfuture.com
,@hatching.io
)
Support will then provide you:
- Single Sign-on (ACS) URL
https://private.tria.ge/sso/<unique identifier>/saml/acs
- Service Provider Entity ID URL
https://private.tria.ge/sso/<unique identifier>/saml/metadata
- SSO start URL
https://private.tria.ge/login/saml/<unique identifier>
These URLs are required to set up SAML in your Identity Provider (IdP).
2. Add Sandbox to your Identity Provider (IdP)
Configure SAML in your IdP with the provided unique ACS
and Entity ID
URLs. Configure the app registration to send
the following attributes.
Required attributes
Attribute name | Description |
---|---|
User Email. Will also be used to link IdP account to pre-existing user in Sandbox. |
Optional attributes
Attribute name | Description |
---|---|
displayname | Name displayed in Sandbox |
or | |
firstname | First name |
lastname | Last name |
sandbox_role | Role for user (like: org_advanced ). See role matrix for more info |
Triage supports SAML SSO through Okta
, Google
and Azure
. Be sure to let us know if you require other identity providers.
IdP specific setup guides:
3. Share your SAML IdP Metadata file
Share your XML file with Support([email protected]) via a file attachment or link. Support will send out a notification once SAML has been configured for testing. username+password logins will continue to work.
4. Test logging in through SSO
Support will provide you an SSO start URL (example: https://private.tria.ge/login/saml/<unique identifier>
) which
can be used to initiate SSO directly. Test signing in with a user by navigating to this URL.
Reach out to Support([email protected]) to let them know SAML is configured correctly.
Finally
Support will disable username+password login. Existing users will be automatically redirected to SSO. New users signing in with provided email domains or users navigating to the SSO start URL will be redirected to SSO.