Skip to main content
System StatusContact Support
VersionOne Community

On-Demand Single Sign-On

This feature is available in Catalyst, Enterprise, and Ultimate editions.

editions-ceu.png

Overview

On-Demand customers choose the Hosted Single Sign-On (SSO) authentication option for two main reasons:

  • Improved online experience for end users

  • Centralized user access control

Hosted SSO uses the SAML (Security Assertion Markup Language) protocol, which is quickly becoming the standard approach for providing federated authentication across applications.

For more information about SAML and its benefits, download the SAML Executive Overview.

Hosted SSO is no longer included in Ultimate Edition.

Configuration Details

The customer must have a SAML Identity provider (IdP) that supports the following SAML 2.0 profiles:

  • IdP-Initiated POST

  • SP-initiated POST/POST or Redirect/POST

To add the VersionOne Service Provider (SP) to your Identity Provider (IdP), we’ll provide our SAML 2.0 metadata file for import, as well as guidance on relaystate. The metadata file contains URL endpoints and all necessary public keys.

To configure the VersionOne Service Provider (SP) for your instance of V1, we’ll need your Identity Provider (IdP) SAML 2.0 metadata file, including any public keys used for signing or encryption (either in the metadata or separately). We will also need to understand the attribute contract used to map an attribute to the V1 username (e.g. SAML_SUBJECT), and how signing and encryption need to be configured.

In addition to SAML configuration on both sides, the application’s usernames need to be updated to match those passed in the attribute contract, and all integrations need to be updated to use SAML SSO authentication to access the API.

Warning About Integrations

Once SAML SSO is enabled, clients must use Access Tokens for authentication to the API endpoints. In other words, if you have working integrations or other code using the VersionOne API Endpoints, your existing code will break. Access Tokens are more suitable for system-to-system communications. Since Access Tokens and work with all user-authentication mechanisms.

If you run into specific problems during migration, you can open a support ticket. Or, if the whole process sounds like more that you want to take on alone, you can engage our technical services for a fee.

  • Was this article helpful?