Pre-Built Connections
LoginRadius facilitates Pre-Built Connections to effortlessly handle your Federated Single Sign-On (SSO) integrations using ready-made configuration templates. In LoginRadius, you can swiftly establish SSO connections, allowing users to authenticate through LoginRadius and seamlessly access various applications.
Presently, LoginRadius supports the pre-built integration template for the below-mentioned connections.
- Salesforce
- Fresh Desk
- Zendesk
Now, let's delve deeper into the configuration steps for each of them by first navigating to Platform Configuration > Federated SSO > Integrations in the Admin Console, clicking on Add SSO Integration, followed by clicking on the respective cards, i.e., Salesforce, Fresh Desk or Zendesk.
Configuring Salesforce
-
Once you click on the Salesforce card, the configuration fields would appear on the screen as displayed below.
-
In the Name field, enter a unique name for your Salesforce integration.
Note: Below are the validation rules that should be taken care of while creating the Provider Name. If any of the below validation rule is not followed the error message:
App Name is not valid
will be shown.- Only _ (underscore) and - (hyphen) are allowed as a special charater.
- App name should start with a character.
- Alpha numeric values are allowed.
- No space is allowed in between.
- Minimum length of the app name should be [1] and maximum length upto [60] is allowed.
- Now all the app names are allowed in lowercase only. If the uppercase is entered it will be automatically coverted into lowercase.
-
In the Callback URL field, enter the location to which an IdP (Identity Provider) sends assertions using whichever protocol and binding it shares with the SP (Service Provider).
-
In the Audience field, enter the Entity ID which is an arbitrary logical URL that identifies the Salesforce resource and click on the SAVE button.
-
Upon saving the configuration, the screen below will emerge, presenting additional steps outlined within the Tutorial tab. These steps guide you through the necessary configurations to be implemented in the Salesforce developer console.
-
Additionally, you have the option to navigate to the Configuration tab for updating any of the configuration fields. You can also choose to delete the configuration by clicking on the delete button (represented by the Bin Icon) for the corresponding configuration.
-
Access to advanced configurations for this setup will also be available through the dedicated protocol tab (SAML). For the same, navigate to Platform Configuration > Federated SSO > SAML
For comprehensive details and step-by-step configuration instructions for setting up the Salesforce, refer to the LoginRadius as IDP with Salesforce as SP document.
Configuring Fresh Desk
-
Once you click on the Fresh Desk card, the configuration fields would appear on the screen as displayed below.
-
In the Name field, enter a unique name for your Fresh Desk integration.
Note: Below are the validation rules that should be taken care of while creating the Provider Name. If any of the below validation rule is not followed the error message:
App Name is not valid
will be shown.- Only _ (underscore) and - (hyphen) are allowed as a special charater.
- App name should start with a character.
- Alpha numeric values are allowed.
- No space is allowed in between.
- Minimum length of the app name should be [1] and maximum length upto [60] is allowed.
- Now all the app names are allowed in lowercase only. If the uppercase is entered it will be automatically coverted into lowercase.
-
In the Callback URL field, enter the location to which an IdP (Identity Provider) sends assertions using whichever protocol and binding it shares with the SP (Service Provider).
-
In the Audience field, enter the intended receipients of the assertions issued and click on the SAVE button.
-
Upon saving the configuration, the screen below will emerge, presenting additional steps outlined within the Tutorial tab. These steps guide you through the necessary configurations to be implemented in the Fresh Desk developer console.
-
Additionally, you have the option to navigate to the Configuration tab for updating any of the configuration fields. You can also choose to delete the configuration by clicking on the delete button (represented by the Bin Icon) for the corresponding configuration.
-
Access to advanced configurations for this setup will also be available through the dedicated protocol tab (SAML). For the same, navigate to Platform Configuration > Federated SSO > SAML
Configuring Zendesk
-
Once you click on the Zendesk card, the configuration fields would appear on the screen as displayed below.
-
In the Name field, enter a unique name for your Zendesk integration.
Note: Below are the validation rules that should be taken care of while creating the Provider Name. If any of the below validation rule is not followed the error message:
App Name is not valid
will be shown.- Only _ (underscore) and - (hyphen) are allowed as a special charater.
- App name should start with a character.
- Alpha numeric values are allowed.
- No space is allowed in between.
- Minimum length of the app name should be [1] and maximum length upto [60] is allowed.
- Now all the app names are allowed in lowercase only. If the uppercase is entered it will be automatically coverted into lowercase.
-
In the Zendesk Account Name field, enter the name of your Zendesk account and click on the SAVE button.
-
Upon saving the configuration, the screen below will emerge, presenting additional steps outlined within the Tutorial tab. These steps guide you through the necessary configurations to be implemented in the Zendesk developer console.
-
Additionally, you have the option to navigate to the Configuration tab for updating any of the configuration fields. You can also choose to delete the configuration by clicking on the delete button (represented by the Bin Icon) for the corresponding configuration.
-
Access to advanced configurations for this setup will also be available through the dedicated protocol tab (SAML). For the same, navigate to Platform Configuration > Federated SSO > SAML
For comprehensive details and step-by-step configuration instructions for setting up the SSO with SAML, refer to the Identity Provider Initiated SSO and Service Provider Initiated SSO document.