Settings Import and Validation

Before Importing and validation, the prerequisites need to be satisfied again.

Note: When validating SAML settings, some browsers may not show all errors correctly. If SAML verification/validation does not seem to work under Chrome (for example), try again using Firefox.

 

Settings

  1. Once the prerequisites are satisfied, Access the Single Sign-On (SSO) in the application settings. In the upper right corner of the screen choose Settings.

  1.  Select ‘Single Sign-On’.

  1. Click on the ‘WaspCloud Authentication’ dropdown and select ‘SAML Service Provider Authentication’.

Import

  1. Uploading the Metadata File

Google App Configuration  -  Click on the Select File button to browse the IDP metadata that you downloaded while configuring the Google App and upload it or paste the values you copied out of the Application configuration from https://admin.google.com/. If the import is successful, the page will automatically fill in the values.

Warning! The Issuer field is not really read in from the configuration. This value is calculated to be compatible with Google SAML Id Provider and others. Your SAML Id may require a different value for Issuer.  

Note:  If the Metadata can not be read you’ll have to enter the SAML URL and Certificate yourself. If you lost the values you can always find these values again in your google app. Select “Service Provider Details”.

Click on the Manage Certificates

 

OneLogin Configuration

Click on the Select File button to browse onelogin_metadata_XXXXXXX.xml file that you downloaded while configuring OneLogin and  upload it, thus importing the configuration into Wasp Cloud.

If you copied the other values, simply verify the SAML URL and Certificate with values you saved in the previous steps.

 

ADFS Configuration

Click on the Select File button to browse the Metadata file downloaded from the ADFS Server and upload it.

Validation

  1. Click ‘Validate’ to validate the SAML configuration. You must Validate the Configuration for it to take effect. If you do not validate the configuration it will not be used.  

If validation fails,

If Signature fails,