SAML Configuration
This topic covers the steps to configure SAML in EMS for use with EMS Web App and Direct Spaces.
EMS supports SP initiated SAML SSO, and requires a single attribute to be returned in the SAML assertion to authenticate users. That attribute must exist in EMS as one of the following fields of the Everyday User record:
-
Email Address
-
External Reference
-
Network ID
Signed requests can be configured and require SP service provider keys to be created. Encrypted assertions/responses are currently not supported.
You must follow optional steps if signed SAML requests are received.
-
Navigate to the EMS Platform admin page and sign in using Web Administrator Everyday User credentials.
-
Click the AUTH KEYS pane.
-
Click New Auth Key.
-
Set Purpose to SAML Service Provider.
-
Enable Auto-Generate Keys.
-
Click Save Auth Key.
Optionally, on the SAML pane in EMS Platform, you can enable Allow user to auto-create. When this is enabled, if a user successfully authenticates with your identity provider via SAML in EMS Web App but an everyday user account with their email address does not exist in EMS, one is automatically created using the default security template and status for new users parameter settings and process templates enabled as available for new users.
If you are using HR Toolkit to manage your everyday users, you must not enable this. Once you enable this setting, you can map SAML Attributes from your IDP to the following fields in EMS:
-
Name – required
-
Email Address – required
-
Network ID – optional
-
Phone – optional
-
Fax – optional
The format and names of the SAML Attributes depend on your IDP, for example, http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress for email address.