Configuring SAML Single Sign-on

Create OneLogin application

  1. Access OneLogin and sign in.
  2. On the navigation bar, click Administration to access administrator mode, then click on Applications to add a new application for integration.
  1. Click Add App to add a new application.
  1. Enter "SAML" in the search box and select SAML Custom Connector (Advanced) version SAML2.0 in the results panel.
  1. In the new page, fill in Display Name with MDCore-SAML, for example, and click Save.

Create SAML directory in MetaDefender Core

  1. Sign in to MetaDefender Core.
  2. In the dashboard, click on User Management in the left sidebar.
  3. On User Management page, select Directories tab and click Add Directory in the top right corner.
  1. In Add Directory page, select SAML as Directory type, and enter a name for the new directory, such as MDCore-SAML.
  2. In Service Provider section, enter Host or IP where MetaDefender Core is hosted, for this example use https://127.0.0.1:8008.
  3. Copy the string generated under Login URL and store it as reply_uri.

Complete configuration in OneLogin

  1. In Applications screen on OneLogin, select Configuration tab.
  2. In Application Details section, fill in Recipient and ACS (Consumer) URL* with the Login URL copied from MetaDefender Core. Fill in ACS (Consumer) URL Validator* with a regular expression version of Login URL.
  1. Expand SAML Initiator section, select Service Provider, enter the Login URL copied from MetaDefender Core and click Save.
  1. Select Parameters tab and click the plus button to add more fields that will be used to identify the signed-in users in MetaDefender Core.
  1. Fill in Field name with first_name and click Save.
  1. Expand Value section, choose an appropriate attribute, First Name is an example. Then toggle Include in SAML assertion and click Save.
  1. Click Save in the top right corner.
  2. Drop More Actions down and click on SAML Metadata to copy metadata_url.

Complete configuration in MetaDefender Core

  1. Switch back to MetaDefender Core. Under Identity Provider, click Fetch URL, paste the value of metadata_url into the box below, click OK, and wait a moment for MetaDefender Core to check and set OneLogin as its IdP.
  1. Under Service Provider, fill in ${first_name} in the box labeled User identified by.
  2. Select Default role option, choose the appropriate role to assign to users under User Role, and click Add to complete the settings in MetaDefender Core.
  1. On User Management page, toggle the new directory, MDCORE-SAML in this example. A dialog box will appear to confirm the action. Once Enable is clicked , all sessions will expire immediately.

Test the integration

  1. On the home screen of MetaDefender Core, click Login; the user is redirected to OneLogin page.
  1. Sign in using the account registered with OneLogin.
  2. If everything goes well, MetaDefender Core dashboard is displayed with the user identity in the top right corner.
  1. Otherwise, access backup login page at <mdcore-host>#/public/backuplogin for trouble shooting.

Test IdP-initiated login

  1. Sign in to OneLogin management page.
  2. From the portal menu, navigate to MDCore-SAML and click on the icon.
  1. If everything goes well, the user is redirected to MetaDefender Core dashboard with the user identity in the top right corner.
  1. Otherwise, access backup login page at <mdcore-host>#/public/backuplogin for trouble shooting.
Type to search, ESC to discard
Type to search, ESC to discard
Type to search, ESC to discard