Skip to main content

v2.1

Minor Versionm

Approved General Content Updates

by Steve Miller

Introduction

Dozuki sites support single sign-on (SSO) through the SAML 2.0 protocol. Use this guide to set up a SAML2 connection with OneLogin.

  1. Log in to the Onelogin admin portal for your organization. If you do not have an internal login page, login from: https://app.onelogin.com/login Click on Administration.
    • Log in to the Onelogin admin portal for your organization.

    • If you do not have an internal login page, login from: https://app.onelogin.com/login

    • Click on Administration.

    • Click on Applications from the Applications list.

  2. Click on Add Application. Search for saml. Choose SAML Test Connector (Advanced)
    • Click on Add Application.

    • Search for saml.

    • Choose SAML Test Connector (Advanced)

  3. Type a display name for your Dozuki site into the Display Name field.
    • Type a display name for your Dozuki site into the Display Name field.

    • For customers with a single Dozuki site, we recommend using Dozuki as the display name.

    • Click Save.

  4. Open the management console of your Dozuki site in another browser window. From the Configuration section in the sidebar menu, select Security.
    • Open the management console of your Dozuki site in another browser window.

    • From the Configuration section in the sidebar menu, select Security.

    • Download the SAML `metadata.xml` file.

    • Open this file with a text editor.

  5. Under the Configuration Tab in Onelogin:
    • Under the Configuration Tab in Onelogin:

    • Enter the ACS (Consumer) URL .

    • Refer to the AssertionConsumerService Location value in the SAML `metadata.xml` file.

    • Enter the Single Logout (URL).

    • Refer to the SingleLogoutService Location value in the SAML `metadata.xml` file.

    • Enter the ACS (Consumer) URL Validator setting.

    • This should be formatted with your Dozuki site domain as shown in the image: ^https://\/\/ the Dozuki site domain, followed by \/.*. Additionally add a \ before every .

    • Under Login URL, enter the URL of the page on your Dozuki site that you want your users to reach once signing in.

  6. Scroll down and set SAML initiator to  Service Provider
    • Scroll down and set SAML initiator to Service Provider

    • Click the Save to save all changes.

  7. Under the Parameters Tab in Onelogin: Click the + button to add SAML Test Connector (Advanced) Fields. Enter email into the Field Name.
    • Under the Parameters Tab in Onelogin:

    • Click the + button to add SAML Test Connector (Advanced) Fields.

    • Enter email into the Field Name.

    • Under Flags verify Include in SAML assertion is checked.

    • Click the Save button.

    • Confirm the Value is set to -No default-.

    • Click the Save button to add the field.

  8. Click the + button again to add an additional SAML Test Connector (Advanced) Fields. Enter role into the Field Name. Under Flags verify Include in SAML assertion is checked.
    • Click the + button again to add an additional SAML Test Connector (Advanced) Fields.

    • Enter role into the Field Name.

    • Under Flags verify Include in SAML assertion is checked.

    • Click the Save button.

    • Confirm the Value is set to -No default-.

    • Click the Save button to add the field.

  9. Click the + button to add SAML Test Connector (Advanced) Fields. Enter userid into the Field Name. Under Flags verify Include in SAML assertion is checked.
    • Click the + button to add SAML Test Connector (Advanced) Fields.

    • Enter userid into the Field Name.

    • Under Flags verify Include in SAML assertion is checked.

    • Click the Save button.

    • Confirm the Value is set to -No default-.

    • Click the Save button to add the field.

  10. Click the + button to add SAML Test Connector (Advanced) Fields. Enter username into the Field Name. Under Flags verify Include in SAML assertion is checked.
    • Click the + button to add SAML Test Connector (Advanced) Fields.

    • Enter username into the Field Name.

    • Under Flags verify Include in SAML assertion is checked.

    • Click the Save button.

    • Confirm the Value is set to -No default-.

    • Click the Save button to add the field.

  11. From the page header, Click on Users  and select Users or Groups from the dropdown list. Select the User or Group you to want to assign to the application. Click the Applications tab.
    • From the page header, Click on Users and select Users or Groups from the dropdown list.

    • Select the User or Group you to want to assign to the application.

    • Click the Applications tab.

    • Click the + button and add your Dozuki application.

  12. Select the Dozuki application. Click the Continue button.
    • Select the Dozuki application.

    • Click the Continue button.

    • Fill out the required user fields.

    • Only lowercase should be used when filling out the user fields.

    • If you are adding a user that has an existing user account on your Dozuki site, the email field must match the Dozuki site user's email. If they do not match, a new user will be created upon logging in.

    • Click the Save button to save all entries.

    • You can read more about adding and assigning users in Onelogin.

  13. Select Applications from the Applications list in OneLogin. Select the Dozuki application. Click on the SSO tab.
    • Select Applications from the Applications list in OneLogin.

    • Select the Dozuki application.

    • Click on the SSO tab.

    • Copy the Issuer URL.

  14. Open the management console of your Dozuki site in another browser window. From the Configuration section in the sidebar menu, select Security.
    • Open the management console of your Dozuki site in another browser window.

    • From the Configuration section in the sidebar menu, select Security.

    • Under the Authentication heading section, paste the Issuer URL into the SAML 2.0: Identity Provider ID text field in your Dozuki site.

    • Click the Save button to save your changes.

  15. From the OneLogin site, click View Details of the X.509 Certificate. Copy the X.509 Certificate.
    • From the OneLogin site, click View Details of the X.509 Certificate.

    • Copy the X.509 Certificate.

  16. Open the management console of your Dozuki site. Under the Authentication heading section of the Dozuki Security page, click on SAML: Identity Provider X.509 Certificate. The certificate should be formatted similar to the example shown under the Authentication section.
    • Open the management console of your Dozuki site.

    • Under the Authentication heading section of the Dozuki Security page, click on SAML: Identity Provider X.509 Certificate.

    • The certificate should be formatted similar to the example shown under the Authentication section.

    • Paste the certificate into the text field.

    • Click the Save button to save your changes.

  17. Click on the SAML: Logout URL heading under Authentication. Under the SSO tab in Onelogin, click on the Copy icon next to SLO Endpoint (HTTP). Paste the SLO Endpoint into the SAML: Logout URL text field in your Dozuki site.
    • Click on the SAML: Logout URL heading under Authentication.

    • Under the SSO tab in Onelogin, click on the Copy icon next to SLO Endpoint (HTTP).

    • Paste the SLO Endpoint into the SAML: Logout URL text field in your Dozuki site.

    • Click the Save button to save your changes.

  18. Click on the SAML: Identity provider URL heading under Authentication. Under the SSO section in Onelogin, click on the Copy icon next to SAML 2.0 Endpoint . Paste the SAML 2.0 Endpoint into the Test a SAML identity provider URL text field in your Dozuki site to test the SSO connection.
    • Click on the SAML: Identity provider URL heading under Authentication.

    • Under the SSO section in Onelogin, click on the Copy icon next to SAML 2.0 Endpoint .

    • Paste the SAML 2.0 Endpoint into the Test a SAML identity provider URL text field in your Dozuki site to test the SSO connection.

    • We recommend testing the SAML connection through your Dozuki site before enabling SAML 2.0 as the authentication mechanism. Testing the connection from within Dozuki will prevent disruption to your active site and current users.

  19. Once the connection test succeeds, paste the SAML 2.0 Endpoint into the SAML: Identity provider URL field.
    • Once the connection test succeeds, paste the SAML 2.0 Endpoint into the SAML: Identity provider URL field.

    • Click the Save button to save your changes.

  20. Click on the Single sign on heading under Authentication. Click on the Single Sign On type dropdown menu. Select SAML 2 from the dropdown menu.
    • Click on the Single sign on heading under Authentication.

    • Click on the Single Sign On type dropdown menu.

    • Select SAML 2 from the dropdown menu.

    • Click the Save button to save your changes.

  21. Once SSO is enabled on your Dozuki site, you have the option to add a role attribute prefix. This helps when syncing to third-party IdPs and will allow roles to be passed as `dozuki-<role>` (`dozuki-admin`, `dozuki-author`, etc.) Dozuki defined roles (admin, author, user, etc.) cannot be customized. Click Edit.
    • Once SSO is enabled on your Dozuki site, you have the option to add a role attribute prefix. This helps when syncing to third-party IdPs and will allow roles to be passed as `dozuki-<role>` (`dozuki-admin`, `dozuki-author`, etc.)

    • Dozuki defined roles (admin, author, user, etc.) cannot be customized.

    • Click Edit.

    • Add your desired role attribute prefix.

    • Click Save.

    • Your role attribute prefix will be displayed.

  22. Once Single Sign On is enabled, SSO auth for signoffs &amp; approvals will appear in the Authentication section of the Security settings.
    • Once Single Sign On is enabled, SSO auth for signoffs & approvals will appear in the Authentication section of the Security settings.

    • This feature allows users to enter their SSO authentication for Signoffs and Approvals instead of a separate Dozuki password.

    • SSO auth for signoffs & approvals is enabled by default when you enable SSO authentication.

    • Only disable SSO authentication for signoffs & approvals if you want your users to enter a separate Dozuki password for signoffs and approvals.

Finish Line

One other person completed this guide.

Dozuki System

Member since: 09/24/2009

1 Reputation

183 Guides authored

0 Comments

Add Comment

TRUSTe