Skip to main content

About SAML-based Single Sign-On

SAML, or Security Assertion Markup Language, is a standard that helps different systems communicate about user authentication and authorization. It’s mainly used for Single Sign-On (SSO), which means you can log in once and access multiple applications without entering your credentials again. In Iru Endpoint, you can use SAML for Iru Endpoint Web App access and Require Authentication with Automated Device Enrollment.

How It Works

There are three components that make up a SAML configuration:
  • Identity Provider (IdP) - This system that verifies your identity. It checks your credentials and shares this information with the service you want to use.
  • Service Provider (SP) - This is the application or service you’re trying to access. It trusts the IdP to confirm your identity and lets you in based on that information.
  • SAML Assertions- These are messages that carry information about your identity and access rights from the IdP to the SP. There are three types:
    • Authentication Assertion - Confirms your identity and how you were authenticated.
    • Attribute Assertion- Shares extra details about you.
    • Authorization Decision Assertion - States whether you can access the service.
The SAML authentication process generally works like this:
1

User Requests Access

The user attempts to access a service provider, in this case, Iru Endpoint.
2

SAML Request Generation

Iru Endpoint generates a SAML authentication request and redirects the user to the IdP.
3

User Authentication

The IdP authenticates the user, usually by prompting them to log in if they aren’t already authenticated.
4

SAML Response Creation and Transmission

Once the user is authenticated, the IdP generates a SAML response, which includes a SAML assertion. This assertion contains information about the user, such as their identity and any attributes or roles they have. The SAML response is sent back to Iru Endpoint via the user’s browser.
5

Assertion Validation

Iru Endpoint receives the SAML response and validates the SAML assertion. This involves checking the digital signature to ensure it comes from a trusted IdP.
6

Access Granted

If the assertion is valid, Iru Endpoint grants the user access to log into the Iru Endpoint Web App, or enroll during Automated Device Enrollment.

Setting Up a SAML Connection

These instructions cover how to create a generic Custom SAML SSO connection. For more information on creating IdP-specific Custom SAML connections, please see the following support articles:
1

Navigate to Settings

In Iru Endpoint, navigate to the Settings page.
2

Access Authentication Settings

Click the Access tab.
3

Add New Connection

Find the Authentication section and click the Add button at the bottom left of the authentication section.
4

Select SAML Connection

In the Add SSO Connection pane, select the Custom SAML option.
5

Continue Setup

Click Next.
6

Show Advanced Details

Select Show Advanced Details.
7

Copy ACS URL

Copy the Assertion Consumer Service URL and save it in a text document for later use.
8

Copy Entity ID

Copy the Entity ID and save it, too.
9

Keep Tab Open

Leave this browser tab open as you proceed with the instructions below.

Configuring SAML Connection

Once you have created the connection, you will see the following configuration options displayed in the modal.

Configuration Options

Metadata File: This is the URL to the metadata file for the service provider details. Provide this metadata file to your identity provider if it supports metadata files. Note that this link will not be live until you save the connection page. Advanced Details: If your identity provider does not support metadata files, click Show Advanced Details. The advanced details section, which is covered later in this article, contains information from within the metadata file. Name: Provide a display name for the connection. This will be shown on the login page. Sign-In URL: This is the application sign-in URL provided by your identity provider. Optional Sign-Out URL: This is the SLO URL (Single Logout URL) for your identity provider. SLO allows Iru Endpoint to automatically sign users out of your identity provider when they sign out of Iru Endpoint. Ensure you only fill in this URL if your identity provider supports SLO and it is configured to support SLO specifically with Iru Endpoint. Signing Certificate: Paste the contents of the signing certificate in X.509 PEM format from your identity provider. This certificate is used to evaluate the validity of an incoming SAML claim. Paste the full contents of the certificate, including the BEGIN CERTIFICATE and END CERTIFICATE header/footer. User ID Attribute: Specify the attribute within the SAML claim that should attempt to match against an existing administrator. Typically this will be the NAME ID URI (example below) as long as your identity provider is configured to send the user’s email for the NAME ID value. Otherwise, match against any additional custom attribute that you intend on sending within the claim.
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameidentifier
Sign Request: Choose if the request from the Service Provider (Iru Endpoint) to the Identity Provider should be signed. Sign Request Algorithm: Select the signing algorithm required by your identity provider. Sign Request Algorithm Digest: Select the signing algorithm digest required by your identity provider. Protocol Binding: How should the Service Provider (Iru Endpoint) direct requests to the identity provider (typically HTTP-Redirect). Save: Saves your SAML configuration.

Required Claim Attributes

The following attributes are required in your SAML claim. NameID is technically optional within Iru Endpoint so long as another attribute is specified to match the email address.
If the surname and given name attributes are missing from your claim, the email address will be used for these values.
Attribute URINeeded ValueReasoning
NameID http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameidentifierThe email of the user matching the email of a team member in your Iru Endpoint tenant.Needed to match the user authenticating to Iru Endpoint.
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/surnameThe last name of the user.Needed to update the users last name.
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/givennameThe first name of the user.Needed to update the users first name.

Encrypted SAML Assertions

Encrypted SAML Assertions are fully supported. While not required, we encourage you to encrypt the assertions from your identity provider whenever possible. Encrypting these assertions helps to prevent software (like browser extensions) from collecting private information from the SAML assertion.
Encryption AlgorithmAES256_CBCKey
Transport AlgorithmRSA_OAEP
Encryption CertificateThis is the same public key as used for single logout, it can be downloaded in the advanced details section or from here.

Single Logout

The URL used for Single Logout operations is shown below. HTTP-POST or HTTP-REDIRECT bindings are both supported. The SP Issuer ID is the same as the Entity ID. The public key can be downloaded in the advanced details section or from here.
SLO URL: https://auth.kandji.io/logout

Advanced Details

If your identity provider does not support configuring a service provider application via a metadata file, you will manually fill in this information.
1

Service Provider Metadata File

This is the URL to the metadata file for the service provider details. Provide this metadata file to your identity provider if it supports metadata files.
2

ACS URL

The URL that a SAML assertion should be sent to.
3

Entity ID

The entity ID of the service provider (this is also the SP Issuer ID used for SLO requests).
4

Service Provider Signing Certificate

This certificate is used to sign requests from the Service Provider to the Identity Provider. This same certificate should also be used if the identity provider is configured to encrypt SAML assertions sent to the service provider.

Enabling the Connection

Once you have configured the SAML connection in Iru Endpoint and your identity provider, you can enable it. For step-by-step instructions, please refer to the Enable and Manage a Connection section in our Single Sign-on support article.

Enforcing Single Sign-On

You can disable the standard authentication connection once you have configured at least one Single Sign-on connection. Disabling Iru Endpoint standard authentication will disable the ability for Iru Endpoint administrators in your tenant to authenticate via email/password, Google Sign-in, or Office 365 Sign-in. Please refer to our Single Sign-on support article for step-by-step instructions.

Considerations

Security: Ensure that your identity provider has appropriate security policies configured for SAML authentication. Certificate Management: Keep track of certificate expiration dates and ensure timely renewal to maintain SAML functionality. Testing: Always test the SAML integration with a small group of users before rolling out to your entire organization. Attribute Mapping: Proper attribute mapping is crucial for successful user authentication and profile synchronization.