Login through Azure SAML- based SSO
SigningHub gives you an option to authenticate yourself by using Microsoft Azure's SAML-based Single Sign-on credentials to log into SigningHub. In this case, you don't even need to have a SigningHub ID, as your Azure Active Directory account will be used for SigningHub authentication.
However, logging in through your Azure Active Directory credentials for the first time, will take you to the registration screen and display your Azure Active Directory (email address) for new registration. After registration you can easily login through your Azure Active Directory credentials.
To configure Azure with SAML and use it in SH below steps needs to be completed
- Configure Microsoft Azure
- Configure SigningHub
Configure Microsoft Azure
- Sign in to the Azure portal using your Azure Active Directory administrator account.
- Click on the "Active Directory do Azure".
- Click on the "Enterprise Applications" on right side.
- In the app gallery, you can add an unlisted app by selecting the "Non-gallery Application" tile.
- After entering a Name for your application, you can configure the single sign-on options and behaviour.
|
|
|
- Once app is successfully added, it will be appeared under "Enterprise Applications".
- Select your added app from the list.
- To start, click on Single sign-on from the application's left-hand navigation menu. The next screen presents the options for configuring single sign-on.
|
|
|
- Select this option "SAML-based Sign-on" from the drop down "Single Sign-on Mode" to configure SAML-based authentication for the application. This requires that the application support SAML 2.0. Complete the following sections to configure single sign-on between the application and Azure AD.
- To set up Azure AD, enter the basic SAML configuration. You can manually enter the values or upload a metadata file to extract the value of the fields.
- When a user authenticates to the application, Azure AD will issue a SAML token to the app that contains information (or claims) about the user that uniquely identifies them. By default, this includes the user's username, email address, first name, and last name.
- When you create Non-Gallery application, Azure AD will create an application-specific certificate with an expiration date of 3 years from the date of creation. You need this certificate to set up the trust between Azure AD and the application.
- Click on "Save" button on top.
- To ensure users can sign-in to SigningHub after it has been configured to use Azure Active Directory. Users must be assigned access to SigningHub in Azure AD to sign-in.
- To configure the application for single sign-on, scroll to the end of the SAML-based sign-on configuration page, and then click on Configure SigningHub (Name of the app).
Configure SigningHub
- For configuration at SigningHub go to administrator URL such as "https://admin.signinghub.com/".
- Create the connector by click on add icon from Configurations>Connectors.
- Select the provider "SAML Identity Provider" from the "Provider" drop down.
- Provide the necessary information such as Name, Login & Logout URL (mentioned in step 15), Binding Type (POST/Redirect define in connector), Signature algorithm (SHA1/SHA256 define in connector ), upload IDP certificate downloaded from azure mentioned in step 12 and click on Save button.
|
|
|
- Export the SP metadata by click on "Export SP Metadata" button, this metadata can be use in step 10.
- Create the authentication profile by click on add icon from Configurations>Authentication Profiles.
- Provide the Name, method as "SAML Authentications", Connector that is created in step 19, select logo and Save the information.
- Publish the changes.
- Access the web URL as "https://web.signinghub.com/".
- Click the "More Login Options".
- Click on authentication profile that you have created above.
- Provide the credentials and login here
|
|
For this:
|
|
|
|
See Also
- Login through SigningHub ID
- Login through Microsoft Active Directory
- Login through Salesforce
- Login through Microsoft ADFS
- Login through Microsoft Office 365
- Login through LinkedIn
- Login through Google
- Use OTP as two-factor authentication
- Login through SSL client
- Login through Freja Mobile
- Login through Freja eID
- Login through Bank ID
- Login through itsme
- Login through Azure Active Directory
- Corporate logins
- Login through OIDC
- Login through generic OAuth2
