Skip to content

Latest commit

 

History

History
34 lines (25 loc) · 1.52 KB

saml2.0-configuration.md

File metadata and controls

34 lines (25 loc) · 1.52 KB
description
Enabling SSO for Currents - manual SAML2.0 configuration

SAML2.0 Configuration

Define the following SAML2.0 configuration on your Identity Provider:

  • Call-back URL / ACS URL: https://auth.currents.dev/saml2/idpresponse
  • Audience / Entity ID: urn:amazon:cognito:sp:us-east-1_Z9TVEnj0k
  • NameID format (nameIdentifierFormat) should be urn:oasis:names:tc:SAML:2.0:nameid-format:persistent with a limitation of up to 128 characters
  • Attribute Mappings
IdP AttributeSAML Response Attribute
Emailhttp://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress
Full Namehttp://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
  • The generated metadata XML must have HTTP-POST and HTTP-Redirect bindings, for example:
<md:SingleSignOnService
    Binding="urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST"
    Location="https://sso.jumpcloud.com/saml2/currents"
/>
<md:SingleSignOnService
    Binding="urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect"
    Location="https://sso.jumpcloud.com/saml2/currents"
/>

Once you configured your IdP, please contact the support via in-app chat or email, and provide the following details:

  • IdP Metadata or publicly available metadata document endpoint URL
  • Domains list that your organization members will use to access the dashboard (for example user@example.com)