- Obtain SSOCircle metadata.
- Configure enterprise connection in Auth0.
- Configure SSOCircle as identity provider.
- Test connection.
Prerequisite
You must have a SSOCircle account.Obtain SSOCircle metadata
- Navigate to SSOCircle’s IDP page to see the metadata required for integration. You will be shown an XML file.
-
From this page, you will need to save the following attributes:
- The Location URL for the
SingleSignOnService
attribute with anHTTP-Redirect
type. - The Location URL for the
SingleLogoutService
attribute with anHTTP-Redirect
type.
- The Location URL for the
- Download and save the SSOCircle CA Certificate.
Configure enterprise connection in Auth0
- Go to Dashboard > Authentication > Enterprise > SAMLP and click the plus icon to go to the page that allows you to create a new connection.
- Provide the appropriate configuration settings for this connection. The only mandatory fields are as follows:
Setting | Description | Example |
---|---|---|
Connection name | Auth0 connection name. | myoktaconnection |
Sign In URL | Okta URL where user login requests are sent. This is the Identity Provider Single Sign-On URL value you recorded previously. | https://my_okta_tenant_name.okta.com/app/ my_okta_tenant_namemy_okta_saml_app_integration_name/ dakflkbzevu5i5zBi939/sso/saml |
X509 Signing Certificate | Okta tenant public key signing certificate. Upload the X509 Certificate you downloaded previously. | myOktaTenantSigningCertificate.pem |
-
When setting up mappings, use the following JSON to properly map SAML attributes from SSO Circle:
-
Click Save. In the next window, you’ll be provided two options:
- If you are a domain administrator, click Continue for additional instructions on SAML identity provider configuration.
- If you are not, you can give your domain administrator the provided URL so that they can finish the configuration.
https://{yourDomain}/samlp/metadata?connection={yourConnectionName}
.
You will need to provide this metadata to SSOCircle in the next step.
Configure SSOCircle as identity provider
- Log in to your SSOCircle account. You will be directed to your user profile, and to the left of that is a navigation bar.
- Click Manage Metadata.
- Select Add New Service Provider, and provide the following information to configure the new service provider which, in this case, is Auth0:
Setting | Description |
---|---|
FQDN of the ServiceProvider | auth0.com |
Attributes to send in assertion | Check the box for EmailAddress |
Insert your metadata information: | Paste in the XML metadata that you downloaded after you configured your Auth0 connection. |
- Click Submit.
Test connection
Create Auth0 application
- Go to the Applications page on the Auth0 Dashboard and click + New Application.
- Provide some basic information about your new application. Choose Regular Web Applications as the application type.
- Click Create to finish configuration and begin the Application creation process. You will be directed to the application details page.
- Click Settings.
- In the Allowed Callback URL field, enter the list of allowed callback URLs includes those to which users will be redirected after authentication. The URL(s) entered here must match the callback URL in the HTML code you will create in a later step. Normally, you would enter a URL for your application, but to keep this example simple, users will simply be sent to the Auth0 JWT Tool.
- Click SAVE CHANGES.
- Return to the top of Settings and click Connections.
- Scroll to the Enterprise section. Find the row for the SAML connection you created above and turn on toggle to enable the SAML connection.
Test enterprise connection
- To test your connection, follow the steps in Test Enterprise Connections.
- During this process you will be asked to log in and consent.
- Additionally, if you see a message that says, “Your session has timed out,” click the Return to Login page link below the message.
GET
requests to see where the error occurs. You should see:
- A redirect from your original site to the IDP
- A post of credentials (if you were asked to log in)
- A redirect to the callback URL.