Auth0 SAML Integration

Learn how to configure a connection to Auth0 via SAML.


Introduction

Each SSO Identity Provider requires specific information to create and configure a new Connection (through Application registered). Often, the information required to create a connection will differ by Identity Provider.


Auth0 integration with Cripsa using SAML consists of 4 parts,
  • 1. Create a project/select (an existing) project by logging into https://cripsa.com
  • 2. Create an App in Auth0 using admin account in https://manage.auth0.com/dashboard
  • 3. Use Metadata URL information of the Auth0 App registered to integrate it with Cripsa.
  • 4. Use the Final URI received to call against the User click to start the Authentication process.

Create Project through Cripsa

Login to Cripsa Dashboard by using email account


Auth0 SAML Image-1

Auth0 SAML Image-2

Once logged in Create project for SAML.


Auth0 SAML Image-3

Fill all the details. All the fields are required.


Auth0 SAML Image-4

Click on “Create Project”.


Auth0 SAML Image-5

Note Down all the above highlighted information which will be used while creation of the App in Auth0 Admin Console (https://manage.auth0.com/dashboard).

What Cripsa provides

Cripsa provides the ACS URL and the SP Entity ID. It’s readily available in your Project Detail page of Cripsa Dashboard.


Auth0 SAML Image-6

The ACS URL is the location an Identity Provider redirects its authentication response to. In Auth0’s case, it needs to be set by the Enterprise when configuring your application in their Auth0 dashboard.

The SP Entity ID is a URI used to identify the issuer of a SAML request, response, or assertion. In this case, the entity ID is used to communicate that Cripsa will be the party performing SAML requests to the Enterprise’s Auth0 instance.

Specifically, the ACS URL will need to be set as the “ACS URL” in the “Service Provider Details” step of the Auth0 SAML setup.


What you’ll need

In order to integrate you’ll need the metadata XML file from Auth0.

Normally, this information will come from your Enterprise customer’s IT Management team when they set up your application’s SAML 2.0 configuration in their Auth0 admin dashboard. But should that not be the case during your setup, here’s how to obtain it.


1. Log in

Log in to the Auth0 dashboard, select “Apps” from the sidebar menu, and then select “Applications->Applications->Create Application”. If your application is already created, select it from the list of applications and move to Step 6. If you haven’t created a SAML application, select “Create Application” and then provide the details.


Auth0 SAML Image-7

2. Enter Your App’s Information

Give the app a descriptive name and upload an icon, if applicable. Click “Continue”.


Auth0 SAML Image-8

Auth0 SAML Image-9

3. Obtain Identity Provider Details

Select the “Download Metadata” button to download the metadata file. Save this file, as you’ll upload it to the Cripsa Dashboard in Step 7. Click “Continue”.


Auth0 SAML Image-10

Auth0 SAML Image-11

You can download the Metadata or copy the URI as well and use anyone of it to register with Cripsa.


4. Enter Service Provider Details

Copy and the “ACS URL” from your Cripsa Dashboard and paste it into the “ACS URL” field, and copy the “SP Entity ID” from your Cripsa Dashboard and paste it into the “Entity ID” field in the Auth0 SAML “Service provider details” modal. Select “Continue.”


Auth0 SAML Image-12

Auth0 SAML Image-13

Auth0 SAML Image-14

5. Configure User Access

In the User Management->Users one can add users by clicking on Create User button at the top as shown in the figure below.


Auth0 SAML Image-15

6. Upload Metadata File by Register Auth0 App with Cripsa

If you haven’t already downloaded the metadata file, select your Application->Addons->SAML2 web app, and in the pop-up window click on Usage go to Identity Povider Metadata and click on Download or right click and copy the URI as shown below.


Auth0 SAML Image-16

Auth0 SAML Image-17

Now go back to https://cripsa.com/saml-register-app ->Select your project you have just created.


Auth0 SAML Image-18

Auth0 SAML Image-19

Here Three Fields are Mandatory to fill:
  • Register Type
  • Provider Name (name must be unique with no special character and all in small letter)
  • Metadata URL or File Upload

In the Register Type there are four options, and one has to select anyone of them as per your requirement. For more information on these options please see FAQ.


Auth0 SAML Image-20

Auth0 SAML Image-21

Auth0 SAML Image-22

7. User Login Testing

Using code URI to get code after successful login to Okta.


Auth0 SAML Image-23

Auth0 SAML Image-24

Auth0 SAML Image-25

Auth0 SAML Image-26

Using token URI to get accessToken after successful login to Okta.


Auth0 SAML Image-27

Auth0 SAML Image-28

Auth0 SAML Image-29

Frequently asked questions

1. How many Registration Options available in Cripsa for SAML and what is the difference between them?


In the Register Type there are four options:

  • • Registration of SAML Only
  • • Registration of SAML in Separate Client
  • • Registration of SAML with Other Already registered Auth Type Apps/Method with MFA
  • • Registration of SAML with Other Already registered Auth Type Apps/Method without MFA
Auth0 SAML Image-30

Only the Login screen would be Different for each Registration Type.


Auth0 SAML Image-31
Figure 1 Registration of SAML Only
Auth0 SAML Image-32
Figure 2 Registration of SAML in Separate Client
Auth0 SAML Image-33
Figure 3 Registration of SAML with Other Already registered Auth Type Apps/Method with MFA

Here in the above diagram one can see MFA is available along with SAML authentication.


Auth0 SAML Image-34
Figure 4 Registration of SAML with Other Already registered Auth Type Apps/Method with MFA

Here in the above diagram one can see MFA is available along with SAML and AUTH 2.0 authentication.


Auth0 SAML Image-35
Figure 5 Registration of SAML with Other Already registered Auth Type Apps/Method without MFA