Configure identity provider settings
The identity provider (IDP) provides authentication for users. The service provider (SP), in this case
BlackBerry AtHoc
or Self Service, requests authentication from the IDP.When SSO is enabled for access to the
BlackBerry AtHoc
management system or Self Service, when a user logs in, they are redirected to their organization's IDP for authentication. If the user is already logged in to the identity provider, the authentication request is processed and sent to the service provider, and the user is granted access without the need to log in again.- Log in to theBlackBerry AtHocmanagement system as an Organization Administrator or Enterprise Administrator.
- Click .
- In theUserssection, clickUser Authentication.
- On theUser Authenticationpage, in theAssign Authentication Methods to Applicationssection in theSelf ServiceorManagement Systemsection, clickConfiguration.If theConfigurationbutton is not available, SSO is not enabled. For more information, see Enable single sign-on as an authentication method.
- Do one of the following:
- On theManagement system SSO configurationorSelf Service SSO configurationwindow, in theIdentity Providersection, configure the followingGeneral Settings.
- Identity Provider Name: Each SAML configuration is identified by a unique identity provider name. This name is internal to the configuration and is not exposed to partner providers. This field is required only when there are multiple SAML configurations. Enter a name that is a minimum of three characters and a maximum of 512 characters. The following special characters are not allowed: `!?"<>!$%&^()={},;\:?"<>
- Sign On Service URL: Enter the URL of the location of the identity provider's SSO service where SAML authentication requests are sent as part of a SP-initiated single sign-on.
- Sign On Service Binding: Optionally, selectRedirectorPOSTas the transport mechanism (SAML binding) to use when sending SAML authentication requests to the partner identity provider. The default setting isRedirect.
- Logout Service URL: The URL of the local service provider's single log out service where SAML logout messages are received. If single logout is not required, leave this field blank. For more information, see SSO logout service.
- Logout Service Binding: Optionally, selectRedirectorPOSTas the transport mechanism (SAML binding) to use when sending SAML authentication requests to the partner identity provider. The default setting isRedirect.
- Artifact Resolution Service URL: Optionally, enter an artifact resolution service URL. The service provider uses the Artifact Resolution Protocol to exchange an artifact for the actual SAML message referenced by the artifact.
- Artifact Resolution Service Binding: Optionally, selectSOAP,POST,REDIRECTorARTIFACTas the transport mechanism (SAML binding) to use when sending SAML authentication requests to the partner identity provider. The default isSOAP.
- Name ID Format: Optionally, selectEmail Address,Persistent, orTransientas the format to be used by the SP and IDP to identify a subject name identifier.
- User Mapping Attribute: Optionally, select the attribute that identifies the user. This attribute is retrieved from the SAML assertion metadata. The default isSubject Name.
- Attribute Name: Enter the name of the attribute used to identify the user.
- Configure the followingSecurity Settings:
- SAML Response Signature: SelectSignedorUnsigned. WhenSignedis selected, SAML responses sent to the partner service provider must be signed. Sending signed authentication requests is highly recommended, but optional.
- Assertion Signature: SelectSignedorUnsigned. WhenSignedis selected, SAML assertions sent to the partner service provider must be signed.You must selectSignedfor eitherSAML Response SignatureorAssertion Signatureor both.You must have a valid certificate installed for your organization.
- Signature Algorithm: Select an algorithm. The default isRSA-SHA256.
- Assertion Encryption: SelectEncryptedorUnencrypted. WhenEncryptedis selected, SAML assertions sent to the partner service provider must be encrypted.
- IfAssertion Encryptionis set toEncrypted, select anAssertion Algorithm. The default setting isAES128.
- In theCertificate*field, clickBrowseto navigate to and select a certificate file. Only .cer and .crt files are supported.
- Optionally, add the followingAdditional information:
- Company Name: Enter a name that is a minimum of three characters and a maximum of 512 characters. The following special characters are not allowed: `!?"<>!$%&^()={},;\:?"<>
- Company Display Name: Enter a name that is a minimum of three characters and a maximum of 512 characters. The following special characters are not allowed: `!?"<>!$%&^()={},;\:?"<>
- Company URL
- Contact Person Name
- Role or Department
- Email Address
- Telephone Number
- Do one of the following:
- If you are modifying an existing SSO configuration, clickApply, and then clickSaveon theUser Authenticationpage.
- For a new SSO configuration, configure Service Provider settings.