Setting Up Access via SSO using SAML
SAML stands for Security Assertion Markup Language and is an open standard that allows identity providers (IdP) to pass authorization credentials to service providers providing SSO (single sign-on) and eliminating the need to provide the user credentials for every session. Access via SSO has been tested via the identity providers listed below. Refer to the pages below for instructions on setting up access via SSO with the listed identity providers. Access via SSO may be possible as well with additional identity providers, which has not been tested though.
OKTA | OneLogin | ADFS |
---|---|---|
![]() | ![]() | ![]() |
The SAML protocol lets users configure user attributes to store them in the respective identity provider and allow their roles and names be re-used. The values are set when logging on to Codebashing for the first time. To define the roles and names as attributes, enter the following keys and values in the identification provider under SAML Attributes.
Note
The Codebashing SSO integration supports an auto sign-in option. This option must be defined while configuring the SSO.
key | value |
---|---|
role or roles | Select one of the following user roles:
User roles can be expressed using either "_" or "-". |
name | Any string (as name) |
first_name | Any string (as first name) |
last_name | Any string (as last name) |
Note
The first_name and last_name keys override the name key, if all three are used.