Step 1: Configure service provider - identity_federation - Latest

Precisely Identity Federation Guide

Product type
Software
Product
Precisely Identity Federation
Version
Latest
Language
English
Product name
Precisely Identity Federation
Title
Precisely Identity Federation Guide
Copyright
2024
First publish date
2024
Last updated
2024-10-16
Published on
2024-10-16T20:41:03.880421

This step defines the configuration on the Precisely side so Precisely’s applications can integrate with your IdP.

IdP’s that support SAML 2.0 should have a feature to export a SAML metadata file. If this is not available, or you prefer to configure the service provider options manually, complete each section of the form.
  1. In order to export a SAML file, your IdP may require URLs for Assertion Consumer URL/Single Sign-on URL and Audience URI/SP-Entity-Id. Enter placeholder values for now. Later in the process, this information will be replaced with the actual values.
  2. In the SAML metadata section, upload or paste a SAML metadata file exported from your Identity Provider (IdP). This will automatically populate the IDP Configuration section (Single Sign-On URL, Issuer URI, and Certificate).
  3. Within IDP Configuration, specify the Email Domain users will be signing in with. For example, if your users have email addresses (usernames) like myuser@mydomain.com, enter mydomain.com.
    • By default, the domain you're currently signed in with automatically populates My email domain.

    • If you need to specify a different domain, select Alternate domain.

  4. In the Claims Mapping section, map a Source Field to each required Destination Field. First name, Last name and Email are required. Federated groups is optional. Claims are in URI format. For example, http://schemas.xmlsoap.org/ws/2005/05/identity/claims/givenname
  5. Click Next.