You can choose to enforce SAML SSO for Ally.io with ADFS for added security. Once set up, users in your organization can use their managed ADFS account credentials to sign in to Ally.io via Single Sign-On (SSO.)
In this Article:
Connect SSO to Ally.io
Create an Ally.io App
Sending User attributes
Download Federation Metadata:
Connect SSO to Ally.io
To connect your SSO to your instance of Ally.io, please follow the instructions listed here: Steps to setup SSO
Create an Ally.io App
After you have enabled SSO within Ally.io, the next step is to create an Ally.io App within your SSO:
Open ADFS Management tool
Expand Trust Relationships > Select Relying Party Trusts
Right-click to Add Relying Party Trust
On the Welcome page, click Start
In the Select Data Source page, choose Enter data about the relying party manually
Give a display name such as Ally.io App
In the Choose Profile page, choose ADFS Profile, which mentions SAML 2.0
In the Configure Certificate page, browse and select the certificate to be used for Assertion Encryption. Skip this if Assertion Encryption is disabled
In the Configure URL page, select the checkbox pertaining to Enable Support for the SAML 2.0 Web SSO protocol
Add the SAML consumer url (typically of the form, https://app.ally.io/saml/consume/<uuid> ) and click Next
In the Configure Identifiers page, add the SAML consume URL and click Add, and proceed to the next page
In the Configure MFA now? page, choose ‘I do not want to…’ and proceed
In the Choose Issuance Authorization Rules page, choose ‘Permit all users…’ and proceed
Review and complete the wizard to add the new Relying Party
Sending User attributes
The SAML user attributes can be set via Claim Rules in ADFS as shown below:
1. Email, First Name and Last Name: Add a Claim Rule of type ‘Send LDAP Attributes as Claims’ with the following as the attribute mapping:
2. Name ID: Add a Claim Rule of type ‘Transform an Incoming Claim’ with the following as the settings. This assumes that the Email address is the Name ID.
Download Federation Metadata:
You can get the federationmetadata.xml file from this link https://adfshelp.microsoft.com/MetadataExplorer/GetFederationMetadata or you can find your ADFS Federation Metadata file URL on the ADFS server through the ADFS Management in ADFS > Service > Endpoints and go to section Metadata.
It should look like this https://sts.yourdomain.com/FederationMetadata/2007-06/FederationMetadata.xml If you can’t open the metadata URL link in the Internet Explorer, try using another browser
Update the following fields in the Ally.io SSO Integration by copying them from federationmetadata.xml:
SAML 2.0 Endpoint URL: Location
Identity Provider Issuer URL: entityID
Public (X.509) Certificate: Copy the first X509Certificate value
FAQs:
Q. What to do when there is an error message: ‘We’re sorry, but something went wrong’?
A. We expect a property called “email” in the SAML response, please ensure that it is mapped while setting up your configuration in ADFS.