Single Sign-On (SSO) integration
Supported SSO Methods
Our application provides seamless Single Sign-On (SSO) integration to enhance user authentication and streamline access. We support the following SSO methods:
PINGID (SAML)
Overview
PINGID is a robust SSO solution designed for enterprises to ensure secure and easy access to applications. It offers multi-factor authentication and extensive identity management capabilities.
Requirements
Organization Id: Every organization using PINGID has an id associated with their PINGID account, share it with us.
entryPoint: While activating a new application for an SSO using (SAML) authentication add spEntityId with value https://app.bluenotary.us
Cert: While enabling a new application for SSO in PING-ID user interface it should provide a certificate which ensures the secure access of the SSO implementation.
Callback should return the following details of user after authentication:
{
firstname: string,
lastname: string,
email: valid email address
}
Steps to Configure PingID:
Log in to the PingID Console.
Navigate to the Applications section.
Click Create Application.
Choose the SAML Web App option when prompted.
You will be required to input two values:
ACS URL - https://app.bluenotary.us/api/auth/saml/callback?organizationId=395181e8-f699-4ef0-aeb4-617db088ad53
Entity ID: https://app.bluenotary.us
Note:
The organizationId parameter in the ACS URL corresponds to the ClientId that will be generated after configuring this application in the PingID Console. Initially, you can use the placeholder value random for organizationId in the ACS URL, like so:
https://app.bluenotary.us/api/auth/saml/callback?organizationId=random
After the application is created in PingID, retrieve the generated ClientId.
Update the organizationId value in the ACS URL with the actual ClientId. For example: https://app.bluenotary.us/api/auth/saml/callback?organizationId=<ClientId>
Go to the Edit Configuration section for the created application.
Under the SIGNING KEY field, choose Sign Assertion & Response.
Navigate to the Attribute Mappings section.
Map at least the following fields:
email - Map to Email Address
firstname - Map to Given Name
lastname - Map to Family Name
Note: The value before the hyphen (-) corresponds to the field key used by BlueNotary, and the value after represents the field from the PingID user table.
Once all the above steps are completed, activate the application.
After activation, share the following details with BlueNotary:
Issuer ID
Initiate Single Sign-On URL
SAML Certificate (PEM Format)
ACS URL (including the final organizationId/ClientId value)
Additional Notes:
Ensure all configurations are saved properly in the PingID Console.
Verify the integration with BlueNotary by performing a test login using SAML authentication.
Microsoft Login
Microsoft Login leverages Azure Active Directory (AAD) for SSO, providing a unified and secure authentication experience for Microsoft services and integrated applications.
Google Login
Google Login uses Google Workspace and OAuth 2.0 protocols to provide secure and convenient access to applications.
Other Integrations
Need help with a different SSO or other enterprise integrations? Schedule time with our Solutions Team to explore options!
Updated on: 29/01/2025
Thank you!