DocuSign SAML integration
Multi-Factor Authentication (MFA) is an extra layer of security used when logging into websites or apps. Individuals are authenticated through more than one required security and validation procedure that only they know or have access to.
Security Assertion Markup Language (SAML) is a protocol for authenticating to web applications. SAML allows federated apps and organizations to communicate and trust one another’s users.
Arculix by SecureAuth, as a SAML provider, improves the user login experience for Docusign users with its smart convenient MFA.
Prerequisites
Configured Arculix instance and user account with administrative privileges for Arculix.
Configured Arculix LDAP Agent.
For more information, see the Arculix LDAP Agent deployment guide.
User account with administrative access to the developer dashboard in DocuSign
DocuSign configuration
In this section, you'll configure DocuSign as a service provider (SP).
Download the SAML metadata and certificate for your organization from Arculix.
Metadata download:
https://sso.acceptto.com/<myorganization>/saml/download/metadata
View metadata:
https://sso.acceptto.com/<myorganization>/saml/metadata
Certificate download:
https://sso.acceptto.com/<myorganization>/saml/download/cert
Log in to your Docusign developer portal as an administrator.
Select the Settings tab.
You will need to switch to an admin account. Click SWITCH TO and select DOCUSIGN ADMIN.
Click Domains.
Select CLAIM DOMAIN. Enter your domain name (e.g. test.com) and click Claim.
After adding your domain, click Get the Validation Token.
Copy the token, go to your domain’ DNS server, and add a TXT record with the received token. This will validate your domain name in DocuSign.
Return to the DocuSign dashboard. In the Domains section, click Action and select Validate.
Go back and select Identity Providers under the Access Management section.
In the SSO Protocol: SAML 2.0 section, set the following:
Name
Enter a unique name.
For example, Arculix.
Identity Provider Issuer
Enter the Issuer found in the Arculix metadata.
For example,
https://sso.acceptto.com/<myorganization>/saml
.Identity Provider Login URL
Enter the login URL found in the Arculix metadata.
For example,
https://sso.acceptto.com/<myorganization>/saml/auth
.Identity Provider Logout URL
Enter the logout URL found in the Arculix metadata.
For example,
https://sso.acceptto.com/<myorganization>/saml/logout
.Identity Provider Metadata URL
Enter the metadata URL found in the Arculix metadata.
For example,
ttps://sso.acceptto.com/<myorganization>/saml/download/metadata
.Enable-Third Party
Select the check box to enable.
Set Send AuthN to Post.
Set Send Logout to Post.
In the Custom Attribute Mapping section, add the following attributes:
Field
Attribute Name
emailaddress
Set to emailaddress.
surename
Set to surename.
givenname
Set to givenname.
Save the configuration and select Add New Certificate on the Identity Provider page.
Import the Arculix Certificate downloaded in Step 1.
On the Identity Provider page, click Action and select Endpoints. You can find all the URLs you need for configuring the Arculix Application. Keep this data for the next section.
Arculix SAML configuration as an Identity Provider (IdP)
In this section, you'll add an application for DocuSign and set the SAML configuration settings. This will be the Identity Provider (IdP) side of the configuration.
Log in to Arculix with an administrative account and go to Applications.
Click Create New Application.
In the New Application form, on the General tab, set the following configurations:
Name
Set the name of the application. This is the name to display for push notifications, in the Admin panel, Application portal, and audit logs.
For example, DocuSign.
Type
Set to SAML Service Provider.
Out of Band Methods
Select the allowed methods end users can choose to approve MFA requests.
For example, Arculix Mobile app (push notifications), SMS, or Security Key.
Message for MFA Requests
Optional. Type a message displayed to end users when sending an MFA request via push notification, SMS, or email.
Select the SAML Service Provider Configuration tab, and set the following configurations:
Issuer or Entity ID
Enter the Service Provider Issuer URL provided in the DocuSign Endpoints section.
Log in URL
Enter the Service Provider Login URL provided in the DocuSign Endpoints section.
Metadata URL
Enter the Service Provider Metadata URL provided in the DocuSign Endpoints section.
NameID Format
Set to Email Address.
Name Identifier
Set to Email.
ACS URL
Enter the Service Provider ACS URl provided in the DocuSign Endpoints section.
Go to Add New Attribute Assertion and populate the fields like the table below:
Friendly Name
Name
Value
Name Format
Email
emailaddress
mail
basic
Last Name
surename
sn
basic
First Name
givenname
givenName
basic
Save your changes.
Test your application integration
Go to your DocuSign login portal and enter your username.
Click CONTINUE, then click USE COMPANY LOGIN.
You will be redirected to the Arculix SSO page.
After successful authentication, select your preferred MFA method to approve access to the DocuSign application.
After approving the authentication attempt, you will be redirected to your DocuSign landing page.
Support
If you have questions or need assistance, contact SecureAuth Support.
Sales
Want to learn more about our MFA solutions? Contact our Professional Services for a demo today.
Disclaimer
All product names, trademarks, and registered trademarks are the property of their respective owners.
All company, product, and service names used in this document are for identification purposes only. The use of these names, trademarks, and brands do not constitute an endorsement by the SecureAuth Corporation.