ADSelfService Plus supports single sign-on (SSO) for over 100+ cloud applications right out of the box. The solution also extends its SSO support capability to any SAML-enabled custom enterprise application.
The steps given below will guide you through setting up the single sign-on functionality between ADSelfService Plus and your custom SAML applications.
Log into ADSelfService Plus web-console as an administrator.
Navigate to Configuration → Self-service → Password Sync/ Single sign-on.
Click New Custom App from the top right corner.
Enter your Application name.
Choose the Category to which the application belongs.
For example, Analytics tool, CRM, etc.
Provide a suitable option for the Supported SSO flow.
It is advisable to contact your Service Provider and verify the supported SSO flow before choosing the correct option.
This section allows you to configure settings specific to the Service Provider.
Upload an image for app icon in both sizes.
Choose an RSA-SHA1 or RSA-SHA256 Algorithm depending on the encryption your application supports.
Pick a SAML response (Signed/ Unsigned).
Check with your Service Provider to identify the supported SSO flow and the SAML response. By default, the SAML Assertion will be 'signed'.
In the Domain Name field, enter the domain name of your email address. For example, if you use email@example.com to log in, then mydomain.com is the domain name.
Enter a Display name for the connection.
Based on the SSO flow you selected earlier, enter the required details.
If you had selected SP flow:
In the SAML Redirect URL field, enter the SAML redirect URL your application service provider supplies. The URL value can be found in the application’s default login page or the SSO configuration page.
Enter the Assertion Consumer Service (ACS) URL your application service provider provides in the ACS URL field. This value can also be found in the application's SSO configuration page.
If you had selected IdP flow:
Enter the Assertion Consumer Service (ACS) URL your application service provider in the ACS URL field. This value can also be found in the application's SSO configuration page.
In the Entity ID field, enter the Entity ID that your application service provider supplies. This value can also be found in the application’s SSO configuration page.
Provide a Description in the respective field.
In the Available Policies field, select the policies for which you wish to enable single sign-on.
To add a new domain of the same application, locate the application from the app list and follow the App Configuration steps.
In the SSO/SAML Details pop-up screen that appears, copy the values of Login URL, Logout URL, Help URL, SHA fingeprint or download the required certificate. These values will be needed to complete the configuration at the Service Provider's end.