It is possible to establish a SAML connection with an identity provider so that users can log into Sensedia products using that provider's credentials. The chosen provider must support the SAML 2.0 standard.
NOTEIt is not possible to generate Client Credentials using federated logins.
Configuring a connection with an identity provider involves the following elements:
NOTEIf there are roles configured on your identity provider side, they will prevail over this one.
The fields are explained in the video below:
Explanatory video about SAML 2.0 configuration
Once active, the connection with the identity provider can be updated at any time. To do this, click on any field you want to edit, make the necessary changes and click UPDATE.
To disable a connection, click the DISCONNECT button.
WARNINGBy clicking the DISCONNECT button, all users of that federated login will have their access disabled. To reestablish the connection, follow the steps above again (Configuring a SAML 2.0 connection).
Clicking DISCONNECT does not change your settings with your identity provider.
Unlike what happened with login through the Sensedia Platform, now login with username and password continues to be possible even after configuring SAML 2.0.
A user will be able to log into Sensedia products both via SAML and separately.
To enable a SAML 2.0 connection, an API Manager application must be registered in your identity provider.
See below some examples of configuration using:
NOTEConsult your provider's official documentation for more help with the necessary configurations.
The SAML 2.0 connection can be made with the access provider of your choice. There are several providers, one of them is Okta. To configure it, follow the steps listed below.
Create an Okta account
If you don't already have one, create an Okta account. Access via the link: https://developer.okta.com/signup/
Create a SAML 2.0 type app
To do this, click Applications > Applications and the Create App Integration button, as shown in the figure below.

Then, in the modal screen that opens, select the SAML 2.0 option and click Next

Configure the app
Configure the app, specifying a name for the federated login, icon or logo (optional) and visibility options. Then click Next.
Fill in the configuration fields
On the next screen, fill in the fields:
<MANAGER-URL>/api-manager/api/v3/saml/callback
Further down, in Attribute Statements, fill in:
Name: email
Format: Basic
Value: user.email
Name: name
Format: Basic
Value: user.firstName

Then click NEXT to finish the registration.
Export the metadata
On the screen that appears when you click NEXT, export the metadata by clicking "Identity Provider metadata is available if this application supports dynamic configuration", identified in the following image.
(If the screen doesn't appear, go back to Applications > Applications and click on the name of the application you just created. On the next screen, click the Sign On tab. You should see the screen below)

The screen that opens will show the content, which can be saved as metadata.xml. Note the URL. It will be used to configure API Manager.
Link the Okta user to the created app
To do this, click the Assignments tab and then click Assign > Assign to People, as illustrated in the image below.

On the screen that opens, click Assign next to your name and email, as illustrated in the image below.

On the next screen, click the Save and Go Back button.
NOTEThe user must be linked to the created app for them to be able to log in.
Configure API Manager
After configuring Okta, enter your API Manager.
Go back to the beginning of this page for more details on configuring an integration in API Manager. In summary, in Access Control > Integrations, fill in the fields:
Click CONNECT
To configure Azure AD as an identity provider, follow these steps:
Access Microsoft Entra ID
Access your Microsoft Azure account and click Microsoft Entra ID.

Access Enterprise Applications
Click Enterprise Applications.

Create a new application
If you already have an application created for API Manager, go to step 2 - Configure SAML. Otherwise, click New application.

Create your own application
Click Create your own application.

Configure the application
Enter:

Finalize creation
Click Create.
You will see your application properties, including its ID and object ID.

Configure single sign-on
After creating the application, still on the Overview screen, click Configure single sign-on.

Select SAML
Click SAML.

Edit basic SAML configuration
If you're configuring for the first time, the Configure Single Sign-On with SAML screen will appear as shown in the image below. Click Edit in the "Basic SAML Configuration" section.

Fill in the required fields
Fill in the fields:

NOTEThe Identifier and Reply URL can be obtained from:
- Access Control Settings > Federated Login
- Click SAML2 and the CONFIGURE FEDERATED LOGIN button (the button will be enabled when you click SAML2)
Save settings
Click SAVE to save the settings.

Edit attributes and claims
Click Edit in the "Attributes and Claims" section.

Remove unnecessary attributes
Next to user.givenname and user.surname, click the ... and Delete to remove them and then click OK to confirm.

After removing user.givenname and user.surname, only the email, name and Unique User Identifier fields should remain.
Clear namespaces
The Namespace of the fields that will be kept will come filled in. Clear this field.
For example, the Namespace of the email field comes like this:

and should be like this:

Delete the content of the Namespace field for all three: email, name and Unique User Identifier.
Copy the metadata URL
In the "SAML Certificates" section, copy the content of the App Federation Metadata Url field.

Configure your Sensedia Platform
Configure your Sensedia Platform, following the steps below. If necessary, go back to the beginning of this page for more details on configuring an integration in API Manager.


Fill in the fields:

We use cookies to enhance your experience on our site. By continuing to browse, you agree to our use of cookies.Learn more