Skip to main content

OneLogin Secure SSO integration with SAML

OneLogin is a cloud-based identity and access management company that offers enterprise-level companies and organizations a unified access management (UAM) platform.

This document explains how to configure OneLogin and Invicti Platform for Single Sign-On.

Configure OneLogin with SAML

There are three steps to this procedure:

Step 1: Add Invicti to OneLogin

  1. Select Applications > Applications in the OneLogin administrator's main menu.
  2. Click Add App.
Add application in OneLogin administrator console.
  1. On the Find Applications page, search for "SAML custom connector" and select SAML Custom Connector (Advanced) from the search results.
Search and select SAML Custom Connector (Advanced).
  1. On the Add SAML Custom Connector (Advanced) page, enter a name for your app and optionally change icons and enter a description.
  2. Enable the Visible in portal toggle.
Configure SAML Custom Connector name and visibility
  1. Click Save to add the application.

Step 2: Configure OneLogin SSO integration with SAML

  1. Select Applications > Applications in OneLogin.
  2. Click your app to edit it.
  3. In a new browser tab, select Settings > SSO & Provisioning from the Invicti left-side menu.
  4. Turn on the Enable SSO for your organization toggle.
  5. Select OneLoginSecure from the SSO provider drop-down list.
Enable OneLogin SSO provider in Invicti PlatformEnable OneLogin SSO provider in Invicti Platform
  1. In the OneLogin tab, select Configuration from the left-side menu.
  2. In the Invicti tab, copy the Identifier and paste it into the Audience (EntityID) field on the OneLogin tab.
Audience (EntityID) is required

Although OneLogin doesn't mark this field as required, leaving it empty causes a SAML parsing error on login.

  1. In the Invicti tab, copy the SAML 2.0 Service URL and paste it into the ACS (Consumer) URL field on the OneLogin tab.
  2. In the ACS (Consumer) URL Validator field, do one of the following:
    • Paste the same Identifier value; OR
    • Enter a regular expression pattern to validate the ACS URL (for example, ^https:\/\/yourdomain\.example\.com\/saml\/consume$ or ^https:\/\/.* for testing purposes).
Configure ACS Consumer URL and Validator in OneLogin

info

If using a regular expression pattern for the validator, ensure your regular expression includes the ^ and $ anchors denoting the beginning and end of the URL for security purposes.

  1. Click Save.
  2. Select Parameters from the left menu in the OneLogin tab.
  3. Click + (the plus sign) to add a new parameter.
  4. On the New Field dialog, enter user.FirstName to the Field name.
  5. Select Include in SAML assertion and click Save.
Add new parameter for user's First Name in OneLogin
  1. On the Edit Field user.FirstName dialog, select First Name from the Value drop-down. Then click Save.
Configure First Name parameter in SAML assertion
  1. On the SAML Custom Connector (Advanced) page, select SSO.
  2. From the SAML signature algorithm drop-down, select SHA-256 and click Save.
  3. Copy the Issuer URL field into the IdP identifier field in Invicti.
  4. In the OneLogin tab, copy the SAML 2.0 endpoint (HTTP) URL. Then paste it into the SAML 2.0 endpoint field in Invicti.
Configure SAML 2.0 Endpoint and IdP Identifier in Invicti PlatformConfigure SAML 2.0 Endpoint and IdP Identifier in Invicti Platform
  1. In the OneLogin tab, select View Details in the X.509 Certificate section.
View Details for X.509 Certificate in OneLogin
  1. Copy the X.509 Certificate information and paste it into the X.509 Certificate field in Invicti.
  2. In Invicti, select the checkboxes for signed assertions, encrypted assertions, or sign requests as needed.
Additional security options for assertions and sign requests in Invicti PlatformAdditional security options for assertions and sign requests in Invicti Platform
  1. If you enable any assertions or requests, a new section appears where you can do one of the following:
    • Select Generate a new certificate; OR
    • Select I have an existing certificate, then upload your certificate and enter the certificate password.
Certificate options for encrypted assertions and sign requests in Invicti PlatformCertificate options for encrypted assertions and sign requests in Invicti Platform
  1. From the Invicti SSO exemptions drop-down, you can select specific users to exempt them from SSO. This means the selected users can log in to Invicti via password.
SSO Exemptions field in Invicti PlatformSSO Exemptions field in Invicti Platform
  1. Click Save on the Invicti tab to complete the integration.

Users with existing Invicti accounts who are assigned the Invicti application in OneLogin can now log in using Single Sign-On.

To automatically create Invicti accounts for users on first login, continue to Step 3: Configure auto-provisioning with SAML.

Step 3: Configure auto-provisioning with SAML

Auto-provisioning automatically creates user accounts in Invicti when users log in via OneLogin for the first time. To enable it, you must add the remaining attribute statements in OneLogin so that Invicti receives the user's last name and email, then enable provisioning in Invicti.

Add attribute statements in OneLogin

  1. Open your application and select Parameters from the left-side menu.
  2. Click + (the plus sign) to add a new parameter.
  3. On the New Field dialog, enter user.LastName to the Field name.
  4. Select Include in SAML assertion and click Save.
  5. On the Edit Field user.LastName dialog, select Last Name from the Value drop-down. Then click Save.
  6. Click + again to add another parameter.
  7. On the New Field dialog, enter user.EmailAddress to the Field name.
  8. Select Include in SAML assertion and click Save.
  9. On the Edit Field user.EmailAddress dialog, select Email from the Value drop-down. Then click Save.
LastName and EmailAddress attribute statements configured in OneLogin parameters

Enable auto-provisioning in Invicti

  1. Select Settings > SSO & provisioning from the left-side menu.
  2. In the Provisioning with SAML/SCIM section, set the Enable automatic provisioning for your organization toggle to Yes.
Enable automatic provisioning toggle in Invicti PlatformEnable automatic provisioning toggle in Invicti Platform
  1. In the Default access for new users and teams section, select a role from the Role drop-down to assign to newly provisioned users.
  2. Optionally, click Select collections to choose which collections new users can access. If none are selected, new users get access to all current and future collections by default.
Default access for new users showing role drop-down and select collections optionsDefault access for new users showing role drop-down and select collections options
  1. Click Save.
info

For more information about SSO fields and auto-provisioning behavior, refer to the Single Sign-On configuration document.


Need help?

Invicti Support team is ready to provide you with technical help. Go to Help Center

Was this page useful?