en:single_sign_on_configuration
Differences
This shows you the differences between two versions of the page.
| en:single_sign_on_configuration [2026/05/06 14:44] – created ergo | en:single_sign_on_configuration [2026/05/06 15:29] (current) – ergo | ||
|---|---|---|---|
| Line 12: | Line 12: | ||
| Navigate to the SAML SSO configuration page in Directo. You will see a list of existing IdP configurations, | Navigate to the SAML SSO configuration page in Directo. You will see a list of existing IdP configurations, | ||
| + | |||
| + | From the main menu: Settings -> Common Settings -> SSO Saml Login settings. Or use the search feature. | ||
| ===== Step 2: Create a New Configuration ===== | ===== Step 2: Create a New Configuration ===== | ||
| Line 18: | Line 20: | ||
| - You will be taken to the IdP configuration form. | - You will be taken to the IdP configuration form. | ||
| - | {{< | + | {{: |
| ===== Step 3: Fill in the Button Title ===== | ===== Step 3: Fill in the Button Title ===== | ||
| Enter a descriptive name in the **Button title** field. This is the label that will appear on the SSO login button on the Directo login page (e.g., "Login with Azure AD" or " | Enter a descriptive name in the **Button title** field. This is the label that will appear on the SSO login button on the Directo login page (e.g., "Login with Azure AD" or " | ||
| - | |||
| - | {{< | ||
| ===== Step 4: Configure the IdP Settings ===== | ===== Step 4: Configure the IdP Settings ===== | ||
| Line 32: | Line 32: | ||
| Enter the **Login URL** (also known as SSO URL or SAML Endpoint) from your Identity Provider. This is the endpoint where Directo sends SAML authentication requests. | Enter the **Login URL** (also known as SSO URL or SAML Endpoint) from your Identity Provider. This is the endpoint where Directo sends SAML authentication requests. | ||
| - | {{< | + | {{: |
| **Where to find it:** | **Where to find it:** | ||
| Line 38: | Line 38: | ||
| * **Okta**: Applications → Your App → Sign On tab → Identity Provider Single Sign-On URL | * **Okta**: Applications → Your App → Sign On tab → Identity Provider Single Sign-On URL | ||
| * **Google Workspace**: | * **Google Workspace**: | ||
| - | |||
| - | {{< | ||
| ==== Logout URL (optional) ==== | ==== Logout URL (optional) ==== | ||
| Enter the **Logout URL** (also known as SLO URL or Single Logout Endpoint). This enables single logout — when a user logs out of Directo, they are also logged out of the IdP session. | Enter the **Logout URL** (also known as SLO URL or Single Logout Endpoint). This enables single logout — when a user logs out of Directo, they are also logged out of the IdP session. | ||
| - | |||
| - | {{< | ||
| **Where to find it:** Look for "SLO URL", " | **Where to find it:** Look for "SLO URL", " | ||
| - | |||
| - | {{< | ||
| ==== Metadata URL (required) ==== | ==== Metadata URL (required) ==== | ||
| Enter the **Metadata URL** that points to your IdP's SAML metadata XML document. This URL contains the IdP's signing certificates, | Enter the **Metadata URL** that points to your IdP's SAML metadata XML document. This URL contains the IdP's signing certificates, | ||
| - | |||
| - | {{< | ||
| **Where to find it:** | **Where to find it:** | ||
| Line 62: | Line 54: | ||
| * **Google Workspace**: | * **Google Workspace**: | ||
| - | {{< | + | {{: |
| + | |||
| + | (Azure SSO pictured above) | ||
| ===== Step 5: Configure Name ID Mapping ===== | ===== Step 5: Configure Name ID Mapping ===== | ||
| Line 72: | Line 66: | ||
| Choose the option that matches how your IdP is configured to send the Name ID claim. | Choose the option that matches how your IdP is configured to send the Name ID claim. | ||
| - | |||
| - | {{< | ||
| ===== Step 6: Save the Configuration ===== | ===== Step 6: Save the Configuration ===== | ||
| + | |||
| + | {{: | ||
| Click **Save**. If you provided a Metadata URL, Directo will automatically import the IdP's signing certificates during the first save. | Click **Save**. If you provided a Metadata URL, Directo will automatically import the IdP's signing certificates during the first save. | ||
| - | |||
| - | {{< | ||
| ===== Step 7: Manage Certificates ===== | ===== Step 7: Manage Certificates ===== | ||
| Line 85: | Line 77: | ||
| After saving, the **Trusted Certificates** section appears below the form. This section shows the signing certificates imported from your IdP's metadata. | After saving, the **Trusted Certificates** section appears below the form. This section shows the signing certificates imported from your IdP's metadata. | ||
| - | {{< | + | {{: |
| ==== Importing Certificates ==== | ==== Importing Certificates ==== | ||
| Line 91: | Line 83: | ||
| * Certificates are automatically imported from the Metadata URL on first save. | * Certificates are automatically imported from the Metadata URL on first save. | ||
| * To manually import or re-import certificates, | * To manually import or re-import certificates, | ||
| - | |||
| - | {{< | ||
| ==== Certificate Rollover ==== | ==== Certificate Rollover ==== | ||
| Line 118: | Line 108: | ||
| - Click the button and verify that you are redirected to your IdP's login page. | - Click the button and verify that you are redirected to your IdP's login page. | ||
| - | {{< | + | {{: |
| + | |||
| + | {{: | ||
| - After authenticating with the IdP, you should be redirected back to Directo and logged in. | - After authenticating with the IdP, you should be redirected back to Directo and logged in. | ||
| Line 135: | Line 127: | ||
| :!: **Warning: | :!: **Warning: | ||
| + | |||
| + | :!: **Warning: | ||
| + | |||
| + | {{: | ||
| ===== Troubleshooting ===== | ===== Troubleshooting ===== | ||
en/single_sign_on_configuration.txt · Last modified: 2026/05/06 15:29 by ergo