Pre-Built Connections
LoginRadius supports a pre-built template to expedite deploying some of the frequently leveraged custom identity providers enabling users to authenticate with the identity provider (IdP) and access multiple service provider (SP) apps through LoginRadius. For those seeking advanced configurations, the configuration options are conveniently located under the respective protocol tab, offering a comprehensive and tailored approach to identity management.
Presently, LoginRadius supports the pre-built integration template for the below-mentioned providers.
- Salesforce
- Azure AD
- Google Workspace
- PingIdentity
- Okta
Now, let's delve deeper into the configuration steps.
Configuring Pre-Built Connections
-
Navigate to Platform Configuration > Custom IDPs > Integrations in the Admin Console and click on Add SSO Integration.
-
Now, click on any of the supported pre-built integration templates to start configuring the same as an identity provider.
-
The configuration fields would appear on the same screen for creating a new integration based on the selected pre-built integration template. Let’s take Salesforce for instance.
-
In the Name field, enter a unique name for your Salesforce or any other integration.
Note: Below are the validation rules that should be taken care of while creating the Provider Name. If any of the below validation rules is not followed the error message:
App Name is not valid
will be shown.- Only _ (underscore) and - (hyphen) are allowed as a special charater.
- The app name should start with a character.
- Alphanumeric values are allowed.
- No space is allowed in between.
- The minimum length of the app name should be [1] and a maximum length up to [60] is allowed.
- Now all the app names are allowed in lowercase only. If the uppercase is entered it will be automatically converted in lowercase.
-
In the ID Provider Location field, enter the location to which an SP (Service Provider) sends assertions using whichever protocol and binding it shares with the IdP (Identity Provider).
-
In the ID Provider Logout URL field, enter the Sign-Out Endpoint that you get from the SAML account.
-
In the ID Provider Certificate field, enter the certificate for IdP and click on the SAVE button.
-
Upon saving the configuration, the screen below will emerge, presenting additional steps outlined within the Tutorial tab. These steps guide you through the necessary configurations to be implemented in the Salesforce or any other integration’s developer console.
-
Additionally, you have the option to navigate to the Configuration tab for updating any of the configuration fields. You can also choose to delete the configuration by clicking on the delete button (represented by the Bin Icon) for the corresponding configuration.
-
Access to advanced configurations for this setup will also be available through the dedicated protocol tab (SAML). For the same, navigate to Platform Configuration > Custom IdPs > SAML Provider
For comprehensive details and step-by-step configuration instructions for setting up the SAML provider, refer to the Custom SAML Provider document.