Skip to main content

Setting Up Access via SSO using SAML

SAML stands for Security Assertion Markup Language and is an open standard that allows identity providers (IdP) to pass authorization credentials to service providers providing SSO (single sign-on) and eliminating the need to provide the user credentials for every session. Access via SSO has been tested via the identity providers listed below. Refer to the pages below for instructions on setting up access via SSO with the listed identity providers. Access via SSO may be possible as well with additional identity providers, which has not been tested though.

OKTA

OneLogin

ADFS

Okta_Logo.png
onelogin_logo.png
AD_FS_Logo.png

The SAML protocol lets users configure user attributes to store them in the respective identity provider and allow their roles and names be re-used. The values are set when logging on to Codebashing for the first time. To define the roles and names as attributes, enter the following keys and values in the identification provider under SAML Attributes.

Note

The Codebashing SSO integration supports an auto sign-in option. This option must be defined while configuring the SSO.

key

value

role or roles

Select one of the following user roles:

  • cb_user

  • cb-user

  • cb_manager

  • cb-manager

  • cb_admin

  • cb-admin

User roles can be expressed using either "_" or "-".

name

Any string (as name)

first_name

Any string (as first name)

last_name

Any string (as last name)

Note

The first_name and last_name keys override the name key, if all three are used.