Skip to main content

OneLogin SAML integration

Multi-Factor Authentication (MFA) is an extra layer of security used when logging into websites or apps. Individuals are authenticated through more than one required security and validation procedure that only they know or have access to.

Security Assertion Markup Language (SAML) is a protocol for authenticating to web applications. SAML allows federated apps and organizations to communicate and trust one another’s users.

Arculix integrates with OneLogin to provide better security through Arculix's intelligent MFA. Arculix's intelligent MFA uses many different signals to improve security while reducing friction.

This integration uses OneLogin's Trusted IdP feature to improve the security of users' logins to the OneLogin portal.

Prerequisites

  • Arculix account with a configured Identity Provider and LDAP Agent.

    For more information, see the Arculix LDAP Agent deployment guide.

  • User account with administrative privileges for Arculix.

  • User account with administrative privileges for OneLogin.

Arculix SAML configuration as an Identity Provider (IdP)

In this section, you'll add an application for OneLogin and set the SAML configuration settings. This will be the Identity Provider (IdP) side of the configuration.

  1. Log in to Arculix with an administrative account and go to Applications.

  2. Click Create New Application.

    Create new application
  3. In the New Application form, on the General tab, set the following configurations:

    Name

    Set the name of the application. This is the name to display for push notifications, in the Admin panel, Application portal, and audit logs.

    For example, OneLogin.

    Type

    Set to SAML Service Provider.

    Out of Band Methods

    Select the allowed methods end users can choose to approve MFA requests.

    For example, Arculix Mobile app (push notifications), SMS, or Security Key.

    Message for MFA Requests

    (Optional) Type a message displayed to end users when sending an MFA request via push notification, SMS, or email.

    arculix_new_app_onelogin_001.png
  4. Select the SAML Service Provider Configuration tab, and set the following configurations:

    Issuer or Entity ID

    Enter the Issuer/EntityID of your OneLogin instance.

    This value is available in the Trusted IdP section of your OneLogin tenant as SP Entity ID.

    Log in URL

    The URL used to login to your OneLogin portal.

    For example, https://example.onelogin.com.

    NameID Format

    Set to Email Address.

    Name Identifier

    Set to Email.

    ACS URL

    Enter the URL on the service provider where the identity provider will redirect to with its authentication response. It should end at access/idp.

    For example, https://example.onelogin.com/access/idp.

    arculix_new_app_onelogin_002.png
  5. Click the Add New Attribute Assertion button and create the three attributes as shown in the table below.

    This is mandatory if you want to enable the just-in-time provisioning feature on OneLogin.

    Friendly Name

    Name

    Value

    Email

    email

    userPrincipalName

    Last Name

    lastname

    sn

    First Name

    firstname

    cn

    arculix_new_app_onelogin_003.png
  6. Save your changes.

OneLogin configuration

In this section, you'll configure OneLogin as a service provider (SP).

  1. Download the SAML metadata and certificate for your organization from Arculix.

    Metadata download: https://sso.acceptto.com/<myorganization>/saml/download/metadata

    View metadata: https://sso.acceptto.com/<myorganization>/saml/metadata

    Certificate download: https://sso.acceptto.com/<myorganization>/saml/download/cert

  2. In OneLogin, go to Authentication > Trusted IdPs and click New Trust.

    onelogin_new_trust.png
  3. Under Trusted IdPs, click the gray area and provide a name for the Trusted IdP configuration.

    onelogin_trusted_idps.png
  4. Scroll down to the Trusted IdP Certificate section, and paste the content of the Arculix certificate you downloaded earlier.

    onelogin_trusted_idp_cert.png
  5. Scroll up to the Enable/Disable field, and select the Enable Trusted IDP check box.

    onelogin_enable_idp.png
  6. If you want to represent this Trusted IdP as an authentication option on the tenant’s login page via an icon, go to Login Options and select the Show in Login check box. Provide a URL to a suitable icon.

  7. In the Configurations section, in the Issuer field, enter the EntityID of your Arculix tenant (located in the metadata file you downloaded)

  8. Set the Email Domains field.

    This automatically invokes this Trusted IdP when a user enters their email address at login.

  9. Select the Sign users into OneLogin check box.

    This allows inbound identities from the Arculix to be matched to local user accounts within the OneLogin tenant, via responses to the /access/idp endpoint.

    onelogin_saml_configs.png
  10. In the User Attribute section, set the User Attribute Mapping to Email.

  11. In the Protocol section, select SAML.

  12. In the SAML Configurations section, set the following configurations.

    IdP Login URL

    Set to the SSO login URL of your Arculix tenant (located in the downloaded Arculix metadata file).

    For example, https://sso.acceptto.com/acceptto/saml

    SP Entity ID

    This is a dynamically-generated, read-only value that must be registered at Arculix for use as the Issuer or Entity ID.

    IdP Logout URL

    Set to the logout URL of your Arculix tenant (located in the downloaded Arculix metadata file).

    For example, https://sso.acceptto.com/<myorganization>/saml/logout

    onelogin_saml_configs.png
  13. If you want to create/update user accounts seamlessly at the time of login, based on attributes received from Arculix, go to the JIT tab.

  14. In the Just-in-time provisioning section, select the following options.

    • Enable – Select this check box.

    • Set User TIDP after user creation – If you want the user record to reflect the Trusted IdP that was used in account creation, select this check box.

    onelogin_enable_jit_provisioning.png
  15. In the Attribute mappings section, create mappings based on the attribute assertions you created earlier in the previous section.

    • TIDP value – Make sure to use the the {tidp.value} format.

    • Required – Set this to require that attribute.

    • Updatable – Select this check box to update the user record with new information when it comes in from Arculix.

    onelogin_attribute_mapping.png
  16. Save your changes.

  17. You can make Arculix the default IdP by selecting the Set as default Trusted IdP option in your newly created Trusted IP section.

Test your application integration

  1. In a browser, go to your OneLogin URL and enter your username.

  2. You will be redirected to the Arculix SSO page.

    Application login page with email
  3. After successful authentication, select your preferred MFA method to approve access to the OneLogin application.

    Select MFA method
  4. You will be redirected to your OneLogin portal.

    onelogin_portal.png

Support

If you have questions or need assistance, contact SecureAuth Support.

Sales

Want to learn more about our MFA solutions? Contact our Professional Services for a demo today.

Disclaimer

All product names, trademarks, and registered trademarks are the property of their respective owners.

All company, product, and service names used in this document are for identification purposes only. The use of these names, trademarks, and brands do not constitute an endorsement by the SecureAuth Corporation.