Configuring SAML Single Sign-on
Create OneLogin application
- Access OneLogin and sign in.
- On the navigation bar, click
Administration
to access administrator mode, then click onApplications
to add a new application for integration.

- Click
Add App
to add a new application.

- Enter "SAML" in the search box and select
SAML Custom Connector (Advanced)
version SAML2.0 in the results panel.

- In the new page, fill in
Display Name
with MDCore-SAML, for example, and clickSave
.

Create SAML directory in MetaDefender Core
- Sign in to MetaDefender Core.
- In the dashboard, click on
User Management
in the left sidebar. - On
User Management
page, selectDirectories
tab and clickAdd Directory
in the top right corner.

- In
Add Directory
page, select SAML asDirectory type
, and enter a name for the new directory, such as MDCore-SAML. - In
Service Provider
section, enterHost or IP
where MetaDefender Core is hosted, for this example use https://127.0.0.1:8008. - Copy the string generated under
Login URL
and store it as reply_uri.

Complete configuration in OneLogin
- In
Applications
screen on OneLogin, selectConfiguration
tab. - In
Application Details
section, fill inRecipient
andACS (Consumer) URL*
with theLogin URL
copied from MetaDefender Core. Fill inACS (Consumer) URL Validator*
with a regular expression version ofLogin URL
.

- Expand
SAML Initiator
section, selectService Provider
, enter theLogin URL
copied from MetaDefender Core and clickSave
.

- Select
Parameters
tab and click the plus button to add more fields that will be used to identify the signed-in users in MetaDefender Core.

- Fill in
Field name
with first_name and clickSave
.

- Expand
Value
section, choose an appropriate attribute, First Name is an example. Then toggleInclude in SAML assertion
and clickSave
.

- Click
Save
in the top right corner. - Drop
More Actions
down and click onSAML Metadata
to copy metadata_url.

Complete configuration in MetaDefender Core
- Switch back to MetaDefender Core. Under
Identity Provider
, clickFetch URL
, paste the value of metadata_url into the box below, clickOK
, and wait a moment for MetaDefender Core to check and set OneLogin as its IdP.

- Under
Service Provider
, fill in ${first_name} in the box labeledUser identified by
. - Select
Default role
option, choose the appropriate role to assign to users underUser Role
, and clickAdd
to complete the settings in MetaDefender Core.

- On
User Management
page, toggle the new directory, MDCORE-SAML in this example. A dialog box will appear to confirm the action. OnceEnable
is clicked , all sessions will expire immediately.

Test the integration
- On the home screen of MetaDefender Core, click
Login
; the user is redirected to OneLogin page.

- Sign in using the account registered with OneLogin.
- If everything goes well, MetaDefender Core dashboard is displayed with the user identity in the top right corner.

- Otherwise, access backup login page at
<mdcore-host>#/public/backuplogin
for trouble shooting.
Test IdP-initiated login
- Sign in to OneLogin management page.
- From the portal menu, navigate to MDCore-SAML and click on the icon.

- If everything goes well, the user is redirected to MetaDefender Core dashboard with the user identity in the top right corner.

- Otherwise, access backup login page at <mdcore-host>#/public/backuplogin for trouble shooting.
Was this page helpful?