This document provides an overview of the steps required to configure SAML authentication support on the Wyebot dashboard. This is a high-level overview of the process and is not specific to any one IdP. IdP-specific guides can be found below.
To disable local Wyebot dashboard user accounts, follow intructions in the article below:
The Wyebot cloud dashboard supports IdP-initiated SAML SSO as a form of multifactor authentication (MFA). This means the browser session starts at the IdP where the user logs in - not at the Wyebot cloud dashboard. After a successful authentication, the user’s browser session is redirected to the Wyebot dashboard where the session is validated and the user is granted access. The main benefit of SAML SSO is that user credentials are only stored locally in an organization’s infrastructure.
All SAML users are treated as Administrators on the Wyebot dashboard. Limited users are currently not supported for SAML authentication.
On the Wyebot dashboard, user types of Admin and Limited are considered Local users. Password information for these users is stored locally in the Wyebot cloud database. SAML users are Non-Local users and no password information is stored locally for them.
You must always have at least one Local user configured on the dashboard. If your organization wishes to exclusively use SAML users, simply keep one Local user account configured on the dashboard. A Local user can have the same username as a SAML user.
SAML - Security Assertion Markup Language is a standardized method of authenticating and redirecting browser sessions.
SSO - Single Sign-On allows a user to log into one site and reuse credentials across multiple other sites.
Identity Provider (IdP) - The device or provider that performs the authentication. In this example, the authentication is done by Active Directory.
Service Provider (SP) - The service that a user wishes to use. In this example, the SP is the Wyebot cloud dashboard.
SAML User - The user that is attempting to authenticate and access the SP. The user’s credentials are not stored on the SP, only on the IdP.
Consumer URL - The URL an IdP forwards a SAML request to following a successful authentication.
The following steps must be completed to allow SAML SSO with the Wyebot dashboard:
Before enabling the feature, you must first get certificate information from your IdP. Go to the Management → Users tab of the Wyebot dashboard. Click Enable next to SAML Authentication. Next click Add IdP. In the new window provide the following information:
IdP Name: a name to identify this IdP
SHA Fingerprint: SHA1 or SHA256 fingerprint from the IdP certificate
Logout URL: this field is optional and can be used to redirect the user’s browser after logging out of the Wyebot dashboard.
Consumer URL: dynamic URL that is generated after creating the IdP profile
The Wyebot service is added to your IdP similarly to any other SAML application. The main thing required when configuring the service is the Wyebot Consumer URL. Your IdP may refer to this by a different name, but it is the URL where the IdP will send a SAML assertion after a user is successfully authenticated. This URL has the following format:
https://<cloud name>.wyebot.com/saml/login/<unique ID>
The Consumer URL will be displayed after the IdP profile is created.
The IdP must be configured to return certain attributes to the Wyebot Consumer URL when the user’s browser is redirected after authentication. The attributes are:
Local IdP Attribute | Outgoing Attribute Name | Status |
---|---|---|
Email Address | wyebot-username | Required |
Full Name | wyebot-fullname | Optional |
First Name | wyebot-firstname | Optional |
Last Name | wyebot-lastname | Optional |
Depending on your IdP, the full name of a user may be sent as one attribute, or as separate first and last name attributes. Use the appropriate attributes to send the full identity of the user to the Wyebot dashboard.
If the wyebot-username attribute is not included, the user will not be allowed access to the Wyebot dashboard.