Single Sign On (SSO) through SAML

On this page

Introduction

Single Sign On is a convenient way for users to log into multiple services without needing to enter their username and password for each service. SnapLogic supports Single Sign On (SSO) through the Security Assertion Markup Language (SAML 2.0) standard. If you are using a SAML 2.0-compatible Identity Provider (IdP) to perform SAML authentication, you can configure your SnapLogic organization to authenticate users against your IdP. If you disable password-based login, users will have to use SSO. If you leave password-based login enabled, users can choose basic authentication or SSO to log in. You can use multiple IdPs, but only a single IdP can be configured per Org.

SnapLogic certifies the following IdPs as compatible with our platform:

  • OpenAM
  • Microsoft Entra ID
  • Okta
  • Ping

Members of an SSO-enabled Org might need to log into a different Org, such as one provided by SnapLogic for training or product trials. In this case, the account in the Org without SSO should be created using a different email address. 



SAML Overview

The SAML standard defines how Service Providers, in this case, the SnapLogic Platform, communicate with Identity Providers (IdP) to securely authenticate users. You must first create an application integration in your IdP that will handle authorization for all of your SnapLogic Orgs. After you create the application integration in your IdP, export the metadata and import it into your SnapLogic Orgs using Classic Manager or Admin Manager.

The communication between the SnapLogic Platform and the IdP starts after the user clicks the Single Sign On link from the SnapLogic login screen. The user enters an Org name and clicks Log in. The request destination is defined in the SSO configuration. The SnapLogic Platform sends a SAML request to the IdP application integration that you created for SnapLogic. The request contains an AssertionConsumerServiceURL element that specifies where the response should be sent. The IdP ensures that the AssertionConsumerServiceURL is associated with the requester. To make this possible, you must add the Reply URLs for all of the configured SnapLogic Orgs to the IdP application integration. 

You can set up environments to have different IdPs. An SSO login gives users access to all environments configured for the same IdP where they have an account. For example, if a user is a member of Env_1 and Env_2 and they log into Env_1 with SSO, they can switch to Env_2 without logging in again. This is assuming that both environments have the same IdP provider configured. If they also have an account on Env_3 and it uses a different IdP, they need to log out and log in using that IdP to access Env_3.

Configuration

Configuration takes place in both your IdP and in the SnapLogic Platform. You must have Org admin access to configure SSO.  

The main steps include:

  1. Create an IdP application integration for SnapLogic. Some IdPs call this an Application, others an app integration. 
  2. Configure your SnapLogic Orgs

Create an IdP Application Integration

If your company has multiple SnapLogic Orgs that will use the same IdP, use the metadata from one Org to set up one IdP Application Integration. 

  1. Choose one of your SnapLogic Orgs to provide the metadata for the IdP Application Integration. It doesn't matter which Org you choose, however, any user who wants to use SSO to sign in must be a member of this Org.
  2. Log into that SnapLogic Org and do the following:
    1. Click Configure SSO. The dialog opens.
    2. Copy the Entity ID,  Reply URL, and Logout URL to a text file. You will need them when creating your IdP application integration. Note that your IdP might use a different name for these URLs. For example, the SnapLogic Reply URL value goes into the Okta Single sign-on URL field.
  3. Log into the remaining SnapLogic Orgs and do the following:
    1. Click Configure SSO. The dialog opens.
    2. Copy the Reply URL to a text file that you created in Step 2b. Note that the Reply URL contains the Org ID, not the Org name.
  4. Log into your IdP and create one application integration for SnapLogic access:
    1. Provide the Entity ID, Reply URL, and Logout URL for the Org that you chose in step 1.
    2. Provide the Reply URLs that you copied in step 3b to the list of Reply URLs in the IdP’s application integration
  5. Export the metadata from the IdP application integration. In some IdPs, such as Okta, provide a URL instead of a download button. You can open the URL in a new browser tab to view and save the XML.
  6. Save the exported metadata on your machine to use when configuring your SnapLogic Orgs.

Configure SnapLogic Orgs

Use the metadata from the IdP Application Integration for SnapLogic to configure SSO on all Orgs that should use that IdP. 

  1. Log into the Org you used to provide the Entity ID,  Reply URL, and Logout URL for the IdP Application Integration.
  2. In SnapLogic Manager, click Settings in the main menu on the left. The Organization Settings page opens. 
  3. Scroll down and click Configure SSO.
  4. Click Choose File and navigate to the metadata file from your IdP that you saved previously.
  5. Click Update to upload the metadata.
    When the upload finishes, the SnapLogic server validates the metadata and updates the Settings page to reflect the new values.

    Double-check the values to ensure that they refer to your IdP.

  6. Repeat Steps 2 -5 for all Orgs.

Manage SSO Options

You can customize the SSO login with additional authentication at the Org level using the Manage SSO Options feature. This feature enables you to configure AuthnRequest, RequestedAuthN Context Comparison, and AuthNContextClassRef authentication methods after uploading the IdP metadata file.

Prerequisite: You must be an Org admin to access the Manage SSO Options feature.

To add additional authentication methods to the SSO login for SnapLogic users:

  1. Go to SnapLogic Manager, and click Manage SSO Options.

  2. Choose additional authentication options for the SnapLogic users in your Org as appropriate:
    • AuthNRequests Signed: Select True to authenticate the sign-on against a 3rd-party entity. Selecting False declines this authentication method. The default setting is False.
    • RequestedAuthN Context Comparisons: Select the method (exact, minimum, maximum, better). The default setting is exact.
    • AuthnContextClassRef: Click  to enter the context class references as values.
  3. Click Update.

    We recommend that you have at least one admin user with a password login to unlock locked accounts. For example, accounts that are created before applying the SSO login to an Org, might get locked. In such cases, you can use the admin account with a password to log in and unlock the accounts.

Adding Users

After configuring your SnapLogic organization to authenticate via SSO, the organization administrator still needs to add users to the organization to authorize them to use the SnapLogic service. Adding users can be done through the 'Users' page in the Manager.

When creating users, select Disable password-based login if you want to force them to use SSO to log in. 

Logging In

To log in using SSO, navigate to the SnapLogic login page, click Login via Single Sign On. Enter the Org name and then click Log In. The login sequence should first redirect your web browser to the IdP login page and then to the SnapLogic Designer. If the SnapLogic server detects any errors during login, they are displayed below the login form on the SnapLogic home page.

Case Sensitive Login

We support case-sensitive Org names. As a user, make sure that your Org name matches that of your organization in the User Name field of the login page. For example, if the organization name is SnapLogic, then do NOT use Snaplogic as your Organization.

Users In Multiple Orgs

When SSO is enabled, users have access to all Orgs where they have an account. For example, if a user is a member of Org_1 and Org_2 and they log into Org_1 with SSO, they can switch to Org_2 without logging in again.  This is assuming that both Orgs have the same IDP provider configured. If that is not the case, they receive a message stating  SSO login cannot be used for users that are members of orgs that have different identity providers. The authentication process only validates that the person logging into the service is who they say they are; it does not control what they have access to. 

Manage Password Logins

You can give users a choice of using SSO or a password. If you want all users to log in with SSO, password login must be disabled.

To disable password login after you configure SSO, in Classic Manager:

  1. Click Settings from the left navigation bar.
  2. Scroll down and click the Manage Password Logins button under Single Sign-On via SAM v2.0:

    The User Authentication Methods page opens.
  3. Select the appropriate user IDs and click Disable.

The Manager Password Logins button does not show in Classic Manager settings until you configure SSO.


Multi-Factor Authentication

To add multi-factor authentication (MFA) when using SSO:

  • Configure your IdP to require MFA. Consult the IdP documentation for more information.
  • If password login is not disabled for all SnapLogic user accounts, edit multiple accounts as described in the Manage Password Logins section above.
    To edit a single account, you can alternatively:
    • In Classic Manager, from the left navigation pane, select Users.
    • Click a user account to select it.
    • Click Edit.
    • Click to de-select Enable password-based login:
       
    • Click Update.



Related Content