(info) Additional Pages

SSO Self-Service Onboarding
OneLogin SSO Configuration
Okta SSO Configuration
Azure (Entra) SSO Configuration


Single Sign On and Off (SSO) onboarding

As an Account owner,

I want to configure our account for Federated Authentication a.k.a. Single Sign On [and Off] (SSO),

So that my colleagues do not have to memorize yet another password,

And can more easily follow current best-practice data and information security practices.

Account | Settings and Permissions (new)

In a new, collapsable section titled “SSO - Single Sign On/Off” (maybe with the subtext “Federated Authentication”), an admin will be able to manage the accounts Identity Providers (IdPs). Each account, by current design, may have 1 Identity Provider (IdP) per Identity Provider Type. The provider_type (and provider_name) can not change once created.

We will provide hints (preferably as inline links [new window] to vendor documentation) as to where in the various IdP cloud dashboard one can find the information required.

Required information for creating any Identity Provider (IdP), regardless of type

Required information for Identity Providers of type: SAML

(deprecated | see dedicated page) Onboarding onelogin.com IdP hints

Required information for Identity Providers of type: OIDC

Next steps

Once a provider type has been chosen, and the correlated required information fields have been provided, (assuming they clicked CREATE and doing so is a part of the UX), Federated Authentication should be available for this account.

Federated Authentication (SSO) workflows

There are several workflows seen in the wild supporting SSO i.e. workflows people are likely already familiar. The most common is recommended (for MVP) i.e. click a button to be brought to an “SSO login page” (versus our standard user / password / remember me fields).

Workflow: SSO Button (recommended)

Current IAM Authentication page-ish looks very similar to the following mock

Clicking on the SSO tab, for example, would bring one to a new authentication page akin the following mock

Entering an email here allows us to ask Cognito for the correct Identity Provider. Having that, we can redirect to the Federations authentication page. This page is outside of corestrengths.com and manages all the things auth related for said Federation, e.g. logging in, resetting passwords etc. If someone is already logged into this Federation, they are automatically redirected to redirect_uri with a code parameter and whatever state parameter we sent… and technical things begin to happen… ultimately leading to being redirected to our landing page… all on behalf of the person clicking SIGN IN.