SSO Setup

IT-Conductor supports SAML 2.0-based Single Sign-on.

Understanding SAML Configuration

In SAML terms, there are two parties:

  • Identity Provider that supplies the user authentication and is your trusted enterprise credentials - Okta, Microsoft ADFS (Azure or on-prem), Google Workspace, AWS IAM Identity Center, etc.

  • Service Provider - In this case, it is IT-Conductor that supports SSO with Identity Provider, so you don't need to maintain/remember a separate set of credentials.

Configure Identity Provider

To configure Identity Provider, you will need the following IT-Conductor SAML information:

  • Entity ID: https://service.itconductor.com

  • Assertion Consumer Service URL: https://service.itconductor.com/saml/acs

  • Relay State URL: https://service.itconductor.com/home

  • Logout URL: https://service.itconductor.com/saml/logout

Depending on what type of Identity Provider you are configuring, use the links below. Otherwise, use vendor instructions and the information above.

When the Identity Provider configuration is complete, either export Identity (Federation) Metadata XML and/or copy the following attributes:

  • Identity Provider Identifier

  • Login URL

  • Logout URL

  • Certificate (Base64)

  1. Visit service.itconductor.comarrow-up-right and enter your login credentials.

  2. Navigate to Management → Security → SSO Identity Providers.

Figure 1: SSO Identity Providers Actions Panel (Empty List)
  1. If you have previously exported Identity Metadata XML, click and import the file. This will create the new Identity Provide definition.

  2. Alternatively, you can click to create a new Identity Provider definition.

Figure 2: Create SAML Identity Provider Wizard
  1. Copy previously saved values to Identity Provider Info attributes as the following:

  • Name - Unique Name - internal to IT-Conductor

  • Description - Internally identifying information

  • Issuer - Identity Provider Identifier

  • SSO URL - Login URL

  • SLO URL - Logout URL

  • Certificate - exported base64 certificate

Service Provider Info attributes allow you to customize the mapping between Identity Provider and IT-Conductor, normally you don't need to do anything as default mappings should work. Otherwise, contact the IT-Conductor Support Team for assistance.

  1. Click again to insert the Identity Provider.

  2. Verify if the identity provider was added to the SSO Identity Providers actions panel.

Figure 3: SSO Identity Providers Actions Panel (Updated List)

You can now use the SSO to log into IT-Conductor from your Identity Provider.

How to update the SSO certificate in IT-Conductor

  1. On the main menu, navigate to the Management -> Security -> SSO Identity providers.

circle-info

Note: Make sure you have an administrator role; otherwise, you won’t see this option.

Figure 4: SSO Identity Providers Option - Main Menu
  1. Click on the existing certificate entry

Figure 5: SSO Identity Providers
  1. Open the new certificate in a plain text editor and copy the text.

  2. Paste and replace the contents of the new certificate in the Certificate box

Figure 6: Update Certificate Wizard Screen
circle-info

Note: Make sure that the certificate is pasted as a continuous, valid block and avoid accidental extra line breaks from editors like Notepad.

  1. Click on the save icon

  2. To authenticate that the certificate has been updated, open a private/incognito browser session and perform a full SSO login through your normal portal entry point to verify the new certificate flow works end-to-end with IT Conductor. Then confirm successful access after SAML authentication and check logs if available to ensure the login token and certificate validation succeed.

Last updated