Skip to main content

Auth0 SAML integration

Acceptto integrates with Auth0™ via its SAML solution and provides a single sign-on (SSO) MFA to ensure the convenience of cloud SSO without its potential security risks. Multi-Factor Authentication (MFA) is an extra layer of security used when logging into websites or apps. Individuals are authenticated through more than one required security and validation procedure that only you know or have access to.

Auth0 is built for developers and is a trusted portal. Use this guide to configure Acceptto to add MFA to the Auth0 portal to provide secure login for developers.

Prerequisites

  • Acceptto account with a configured Identity Provider and LDAP Agent.

    For more information, see the LDAP Agent deployment guide.

  • Auth0 user account with administrative privileges.

  • User account with administrative privileges for the Acceptto eGuardian dashboard.

Auth0 configuration

In this section, you'll configure Auth0 as a service provider (SP).

  1. Download the SAML metadata and certificate for your organization from Acceptto.

    Metadata download: https://sso.acceptto.com/<myorganization>/saml/download/metadata

    View metadata: https://sso.acceptto.com/<myorganization>/saml/metadata

    Certificate download: https://sso.acceptto.com/<myorganization>/saml/download/cert

  2. Log in to your Auth0 instance as an administrator and go to Authentication > Enterprise.

  3. Click the + icon next to SAML.

    Auth0 admin portal
  4. In the New SAML Connection section, set the following configurations:

    Connection Name

    Enter a unique identifier for the connection.

    For example, Acceptto.

    Sign In URL

    Enter the URL used to log in to your Auth0 panel.

    For example, https://sso.acceptto.com/example/saml/auth.

    X509 Signing Certificate

    Click + Choose File and upload the certificate downloaded in Step 1.

    New SAML connection
  5. Save your changes.

  6. On the next page, set the following configurations:

    Sign Out URL

    Enable and set to the URL used to log out of your Auth0 panel.

    For example, https://sso.acceptto.com/example/saml/logout

    Sign Request

    Enable and download the IdP signature certificate for Acceptto configuration.

    SAML configuration
  7. Save your changes.

  8. Select the Setup tab and click Continue.

    SAML setup
  9. Copy the information on this page for Acceptto configuration.

  10. Go to Applications and select the application you want to connect.

  11. In the Connections section, turn on Acceptto, and turn off all other sources.

    Auth0 connections tab

Acceptto SAML configuration as an Identity Provider (IdP)

In this section, you'll add an application for Auth0 and set the SAML configuration settings. This will be the Identity Provider (IdP) side of the configuration.

  1. Log in to the Acceptto Dashboard with an administrative account and go to Applications.

  2. Click Create New Application.

    Create new application
  3. In the New Application form, on the General tab, set the following configurations:

    Name

    Set the name of the application. This is the name to display for push notifications, in the Admin panel, Application portal, and audit logs.

    For example, Auth0.

    Type

    Set to SAML Service Provider.

    Out of Band Methods

    Select the allowed methods end users can choose to approve MFA requests.

    For example, It'sMe app (push notifications), SMS, or Security Key.

    Message for MFA Requests

    (Optional) Type a message displayed to end users when sending an MFA request via push notification, SMS, or email.

    Add Auth0 application
  4. Select the SAML Service Provider Configuration tab, and set the following configurations:

    Issuer or Entity ID

    Enter the Issuer/EntityID provided in Auth0.

    For example, urn:auth0:yourdomain:YOUR_CONNECTION_NAME.

    Sign in URL

    Enter the URL used to log in to your Auth0 panel.

    NameID Format

    Set to Unspecified.

    Name Identifier

    Set to Email.

    ACS URL

    Enter the ACS URL provided in Auth0.

    For example, https:/yourdomain.auth0.com/login/callback?connection=YOUR_CONNECTION_NAME.

    Single Logout URL

    Enter the URL used to log out of your Auth0 panel.

    For example, https://yourdomain.auth0.com/logout.

    Algorithm

    Set to RSA-SHA256.

    Auth0 SP configuration
  5. Save your changes.

Test your application integration

  1. Run your Auth0 application. You will be redirected to the Acceptto SAML page.

    Auth0 login
  2. After successful authentication, you’ll see the Acceptto login page. Sign in with your username and password or scan the QR code.

    SSO login
  3. After successful authentication, you will be redirected to your Auth0 application page.

Support

If you have questions or need assistance, contact SecureAuth Support.

Sales

Want to learn more about our MFA solutions? Contact our Professional Services for a demo today.

Disclaimer

All product names, trademarks, and registered trademarks are the property of their respective owners.

All company, product, and service names used in this document are for identification purposes only. The use of these names, trademarks, and brands do not constitute an endorsement by the SecureAuth Corporation.