Follow this guide to use SAML 2.0 SSO to connect to Mursion
Configuring SAML 2.0
This guide provides information on how to configure integration between Mursion and a SAML 2.0 Identity Provider (IdP). This is only available for Account Owners.
The Mursion SAML 2.0 integration currently supports the following features:
- SP-initiated SSO
- JIT (Just In Time) Provisioning
Add SSO in the Portal
- Sign into Mursion Portal
- Select Settings
- Click Create SSO Configuration
- Please review this note about Claim fields, then, on the New SSO Configuration dialog, enter the following:
- Protocol: Select SAML 2.0.
- Configuration Name: Enter a descriptive name of your choice.
- Single Sign-On Service Endpoint: Enter or copy and paste the Identity Provider Single Sign-On/Login URL.
- Logout Endpoint: Enter or copy and paste the Identity Provider Logout URL.
- Entity ID: Enter or copy and paste the Identity Provider Issuer.
- X.509 Certificate: Copy and paste the PEM formatted text of the IdP Signing certificate that will be used to verify SAML responses. Make sure to include the -----BEGIN CERTIFICATE----- header and
- -----END CERTIFICATE----- footer.
- Email Claim Name: Enter email.
- First Name Claim Name: Enter firstName.
- Last Name Claim Name: Enter lastName.
- Single Logout Enabled: Optionally, check this option to initiate a request to end the Okta user’s session when the user’s Mursion Portal session ends due to explicit logout or session timeout.
- Team Claim Name: Optionally, to externally manage team assignment through a SAML user attribute, specify the name of the attribute that contains the value that should be used to assign users to a Mursion Portal team.
- Team Mapping: If a Team Clain Name is specified, click the Add + button to add a mapping. Select a Mursion Portal team from the Team drop down. Enter the value of the attribute that should be mapped to the Portal team. To remove a mapping, click the x on the right of the mapping.
- Click Create SSO Configuration.
- Click the newly created SSO Configuration.
- On the Edit SSO Configuration dialog,
- Click Download SP Metadata. Save the metadata XML file.
- Click to copy the SP Initiated SSO URL. Save the URL to be used in a subsequent step to test the SSO configuration.
Identity Provider (IdP)
- In the IdP, add a new application or configuration.
- If the IdP supports configuration by uploading Service Provider metadata, upload the metadata XML file that was downloaded from Mursion Portal. If the IdP does not support configuration by uploading Service Provider metadata, use the information in the metadata XML file that was downloaded from Mursion Portal to configure appropriate Service Provider related fields (Assertion Consumer Service URL, etc).
- Mursion Portal only supports SP Initiated login process and sends authentication requests (AuthnRequest) to IdPs by HTTP Redirect. Set the appropriate configuration in the IdP for these items.
- Set the appropriate configuration for the Subject/User related configuration:
- Name ID Format: urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified
- Subject/User ID Profile Field: Select user’s email address or other unique identifier
- Set the SP Login URL to the SP Initiated SSO URL that was copied from Mursion Portal in step 7 above.
- Add the following SAML attributes:
- Attribute Name: email Attribute Value: User’s email address
- Attribute Name: firstName Attribute Value: User’s first name
- Attribute Name: lastName Attribute Value: User’s last name
Signing in to Mursion Portal through SSO
- Once the configuration in the IdP and Mursion Portal is completed, click on the application or tile in the IdP to initiate the SP Initiated login process.
- If the IdP does not have a clickable application or tile, simply copy and paste the SP Initiated SSO URL (from step 8 of the Add SSO in the Portal section above) in a browser to sign in to Mursion Portal through SSO.