Skip to main content

SAML Authentication

Datazone supports SAML 2.0-based single sign-on (SSO), allowing you to integrate with your organization’s identity provider for centralized authentication.

Overview

SAML (Security Assertion Markup Language) enables secure authentication between your SAML identity provider (IdP) and Datazone. This allows your users to access Datazone using their existing corporate credentials.

Configuration

To configure SAML authentication in Datazone, you need to provide the following information from your SAML identity provider:

Required Fields

You can find these values in your identity provider’s SAML configuration settings. Refer to our provider-specific guides below for detailed instructions.

Entity ID (Issuer)

The unique identifier for your SAML identity provider (IdP). This is typically provided by your IdP configuration and ensures that SAML assertions are validated against the correct identity provider. Example: https://accounts.google.com/o/saml2?idpid=ABC123

SSO URL (Sign-On Endpoint)

The URL where authentication requests should be sent to your IdP. When users attempt to log in to Datazone, they will be redirected to this endpoint for authentication. Example: https://sso.yourcompany.com/saml/login

Certificate

Upload the X.509 certificate from your SAML identity provider. This certificate is used to verify the authenticity of SAML assertions and ensure secure communication between Datazone and your IdP.
Ensure your certificate is in PEM format and includes the full certificate chain if required by your identity provider.
saml-azure-4

Setup Steps

  1. Access SAML Settings: Navigate to Settings > Authentication > SAML in your Datazone dashboard
  2. Enter Configuration Details: Fill in the Entity ID, SSO URL, and upload your certificate
  3. Save Configuration: Click “Update” to apply your SAML settings

Provider-Specific Guides

For detailed setup instructions with specific identity providers, refer to our provider guides:

Troubleshooting

Common Issues

IssuePossible CauseSolution
Authentication failsInvalid certificateVerify certificate is current and in PEM format
Redirect loopsIncorrect SSO URLDouble-check the SSO URL in your IdP settings
Users not provisionedMissing attributesEnsure email attribute is mapped in SAML response
Need help with SAML configuration? Contact our support team at [email protected]