Creating a SAML SSO authentication service in App Studio
Create a Security Assertion Markup Language (SAML) single-sign on (SSO) authentication service so that users can authenticate using a SAML identity provider.
- In the navigation pane of App Studio, click .
- Click New, and then click SAML 2.0.
- Enter a Name for the service.
- Click Import metadata to import metadata from your
identity provider.
- To select a URL where the metadata is stored, select via URL, enter a URL, and click Submit.
- To select a file where the metadata is stored, select via file, enter a file name, and click Submit.
- Select how to map the user identifier from the SAML assertion to the Pega
operator ID.
- To map from the standard name identifier attribute, select NameID.
- To map from any other SAML attribute, select Attribute and enter an attribute name. Enclose the attribute name in curly braces, for example, {uid}.
- Optional: To automatically create an operator when the operator who is logging in does
not already exist in the Pega database, do the following steps.
- Select the Create operators for new users check box.
- In the Access role list, click the access role for the new user.
- To display the newly created metadata in a new browser window, click the URL
that is displayed under Configure your IdP. To complete the SSO configuration, you must configure Pega Platform as a service provider within your identity provider. To do this, you will need to provide this URL or some of its content.
- Click Submit.
- Optional: To configure advanced functionality, on the Single sign-on (SSO) landing page, where the new service is listed, click the More icon and then click Open in Dev Studio.
- To enable the authentication service, on the Single sign-on (SSO) landing page, where the new service is listed, turn on the switch.
- Creating an OIDC SSO authentication service in App Studio
Create an Open ID Connect (OIDC) single-sign on (SSO) authentication service so that users can authenticate using an OIDC identity provider.
Previous topic Creating an OIDC SSO authentication service in App Studio Next topic Secure your application user interface