Step 2: Provide Security Cloud SAML metadata to your identity provider
In this step you'll configure your identity provider's SAML application with the SAML metadata and signing certificate provided by Security Cloud Control. This includes the following:
-
Single Sign-On Service URL – Also called the Assertion Consumer Service (ACS) URL, this is the where your identity provider sends its SAML response after authenticating a user.
-
Entity ID – Also called Audience URI, this uniquely identifies Security Cloud Sign On to your identity provider.
-
Signing certificate – The X.509 signing certificate your identity provider uses to verify the signature sent by Security Cloud Sign On in authentication requests.
Security Cloud provides this information in a single SAML metadata file that you can upload to your identity provider (if supported), and as individual values, you can copy and paste. See Identity Service Provider Instructions for steps specific to several commercially available identity service providers.
Procedure
1 |
From the Single Sign-On Service and Entity ID values, and download the Public certificate. page, download the SAML metadata file if your identity provider supports it; otherwise, copy the |
2 |
On your identity provider, open the SAML application that you want to integrate with Security Cloud Sign On. |
3 |
If supported by your provider, upload the SAML metadata file; otherwise, copy and paste the required Security Cloud Sign On SAML URIs into the corresponding configuration fields in your SAML application, and upload Security Cloud Sign On public signing certificate.
|
4 |
Configure your SAML application with the Security Cloud Sign On SAML metadata that you obtained in the previous step, either by importing the XML metadata file or manually entering the SSO Service URL and Entity ID values, and uploading the public signing certificate. |
5 |
Return to Security Cloud Control and click Next. |