Applivery Mobility Management
Explore by Topic

Single Sign-On with SAML authentication

Single Sign-On with SAML authentication

Note that this is a premium feature that might not be available in your current plan.

Check the availability in our pricing page.

SAML 2.0 is the last version of the Security Assertion Markup Language specified by the OASIS organization.
This standard was defined for exchanging authentication and authorization data between security domains.

SAML 2.0 is an XML-based protocol that uses security tokens containing assertions to pass information about a principal (usually an end user) between a SAML authority, that is, an identity provider (IdP), and a SAML consumer, that is, a service provider (SP).

This is one of the most popular authentication systems that can be easily configured in most of the Identity Providers su as Azure Active Directory, Okta, OneLogin and many others.

SSO with Azure AD

Step by step tutorial to guide you through the integration of Azure AD authentication in Applivery

Read more

SSO with Okta

Step by step tutorial to guide you through the integration of Okta authentication system in Applivery

Read more

SAML authentication enables web-based authentication and authorization scenarios including cross-domain single sign-on (SSO), which helps reduce the administrative overhead of distributing multiple authentication tokens to the user.
It allow a strengthened corporate security, and a simpler user provisioning.

The main benefits of using a SAML Identity Provider are multiple:

  • Your users will never input their credentials outside of your IdP web-based authentication system and we will never store their passwords.
  • Your user base is centralized and shared between all your internal and external services. You can now provision new users and restrict authorizations at a global level.

SAML authentication workflow

  1. The user goes to your App Store domain or subdomain and clicks the LOGIN button.
  2. The user is redirected to you Identity Provider (IdP) login website
  3. The user uses the IdP web-based authentication system to log in and the IdP sends a SAML Response to the Applivery callback endpoint
  4. If the user is logged in and has the appropriate permissions in Applivery, he/she is allowed to access the App Store where will see only the authorized Apps.

Mapping SAML groups to Applivery groups

In some cases you will need to map SAML Groups from your IdP to the actual groups namings in Applivery. This is an optional step that is only needed for those IdP that do not send the real name of the group. Instead they normally send some kind of ID associated with the group in the IdP. You can do that from the Settings of each SAML configuration using key/value pairs.

Applivery will automatically discover new groups from each authentication and will add them to the list. However you can map them out upfront if you know the IDs.

Doc Content