Skip to main content
Skip table of contents

Activate Single Sign On via SAML in edoobox

Please note: Limited 3

The option to use SAML in your edoobox account is available with the Limited 3 subscription and above. Free support for this topic is limited. If you require more extensive support, we are happy to offer you paid services.

The implementation of a SAML-based single sign-on (SSO) solution in edoobox enables users (super admins, admins, and managers) to navigate seamlessly and securely between their identity provider (Microsoft Azure) and edoobox without having to log in to edoobox again each time or use a new password. This integration helps save time and increase the security of user accounts.

What is SAML?

SAML (Security Assertion Markup Language) Identity Provider (IdP) is a security service that allows users to log in to multiple applications with a single username and password. The IdP generates secure login credentials (SAML assertions) and sends them to the service providers (SP) that host the applications the user wants to log in to. The IdP handles user authentication and authorization, while the SP processes the user's login credentials and controls access to the applications.

Activation of SSO

In the edoobox settings under SAML (SSO), you have the option to add a provider A.

Snag_48e3f53.png

SAML (SSO) settings: SAML provider management

Snag_48e6ae7.png

SAML (SSO): Add provider

Add Provider B

Name

The name used to label the login button could be "SSO your company name," for example. This name serves as a clear indication to users that the button is used for single sign-on (SSO) with your company identity. This name can be changed at any time.

rights of way

If you do not want to control rights management via the authentication provider (Auth Provider), you can set the default right to no rights RECOMMENDATION. This means that rights are not automatically assigned by the authentication service, but are configured by edoobox.

Remote XML URL

For Remote XML URL, you must store the provider's external federationmetadata.xml file. You can find the APP Federation Metadata URL in your Microsoft Azure account.

image-20240523-145101.png

SSO app settings: The APP Federation Metadata URL can be read here.

rights management

If you previously selected the option " No rights " for alternative rights, you must now activate rights management via edoobox.

Link admin

If you select the Link Admin option, an admin stored in edoobox will be linked to SAML. As soon as this person logs in via SAML, these accounts will be automatically linked. This simplifies the access process and ensures that the correct administration rights are available immediately after logging in via SAML.

Then click on "Add" to add the provider.

Now open the stored provider:

Snag_5d50929.png

Added provider: Data Mapping

You will receive an overview of the data you previously entered under Configuration C.

Under Data Field Mapping D, first name, last name, email, and ACL rights are mapped automatically. If you want to map additional data fields, you can do so via the API. There you can configure your own mappings.

In the Information E section, you will find details that are extracted directly from the URL. This data cannot be changed unless you delete the provider and set it up again. It is possible to download the information as federationmetadata.xml.

Check whether the login works by logging in at the following URLs:

edoobox V1 login URL: https://app2.edoobox.com/login/sso/IHR-EDOOBOX-KÜRZEL/
edoobox V2 login URL: https://app2.edoobox.com/ed-admin/pages/sso/IHR-EDOOBOX-KÜRZEL/

When you click on the "SSO your company name"login button, you may receive a message informing you that you could not be logged in. If this window appears, you must enter the URL displayed in the window, , as the identifier (entity ID) with your provider (e.g., Azure).

Note: Redirect to SSO

If an administrator is logged in with SSO and logs out or is automatically logged out by edoobox, the logged-out administrator is automatically redirected to the SSO login page and not to the normal login page. For this to work, the administrator must have logged in at least once before.

Related instructions

Keywords for these instructions

SSO ¦ SAML ¦ APP Federation Metadata URL ¦ Provider

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.