SAML
Please note: if OIDC mode has ben configured before, you must reset the Client ID field to 0 in the OIDC tab and save before proceeding.

Failure to do so will prevent proper SAML configuration. This behavior is known and will be addressed in future releases.
Configure CISO Assistant with SAML
Once you've retrieved the IdP Entity ID, the Metadata URL and the Entity ID from your provider (see the list of providers for specific details), the configuration on CISO Assistant is pretty simple.
Log in into CISO Assistant as an administrator > Extra > Settings

Enable SSO

Enter the Idp Entity ID

Choose the option 1 or 2 depending of your provider and fill Metadata URL or SSO URL, SLO URL, x509 certificate retrieved from your provider

Check that the SP Entity ID is similar to the Entity/Client ID specified on your provider

And that's it! Don't forget to save changes
You should now be able to see the Login with SSO button

Allow single label domains: This allows you to authenticate through SAML on a single-label domain (e.g.
https://ciso-assistant:8443). If this is left unchecked, the only host forms allowed are:IPv4
IPv6
FQDN (e.g. https://www.example.com/)
localhost
Be aware that the user needs to be created on CISO Assistant to be authenticated with SSO.
Last updated
Was this helpful?