# SSO Setup

IT-Conductor supports SAML 2.0-based Single Sign-on.

### Understanding SAML Configuration

In SAML terms, there are two parties:

* **Identity Provider** that supplies the user authentication and is your trusted enterprise credentials - Okta, Microsoft ADFS (Azure or on-prem), Google  Workspace, AWS IAM Identity Center, etc.
* **Service Provider** - In this case, it is IT-Conductor that supports SSO with Identity Provider, so you don't need to maintain/remember a separate set of credentials.

### Configure Identity Provider

To configure Identity Provider, you will need the following IT-Conductor SAML information:

* **Entity ID**: <https://service.itconductor.com>
* **Assertion Consumer Service URL**: <https://service.itconductor.com/saml/acs>
* **Relay State URL**: <https://service.itconductor.com/home>
* **Logout URL**: <https://service.itconductor.com/saml/logout>

Depending on what type of Identity Provider you are configuring, use the links below. Otherwise, use vendor instructions and the information above.

* [Configuring Azure ADFS](https://docs.itconductor.com/user-guide/setup/sso-setup/azure-adfs-identity-provider)
* [Configuring Octa](https://www.okta.com/integrations/it-conductor/)

When the  Identity Provider configuration is complete, either export Identity (Federation) Metadata XML and/or copy the following attributes:

* Identity Provider Identifier
* Login URL
* Logout URL
* Certificate (Base64)

1. Visit [service.itconductor.com](https://service.itconductor.com/) and enter your login credentials.
2. Navigate to **Management → Security → SSO Identity Providers.**

<figure><img src="https://377464071-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FXhp08OmU8050PePmMgDt%2Fuploads%2FCuTxkQjORhZdo4EfaPBz%2FIdentityProviders-Empty.png?alt=media&#x26;token=cf768b0a-cd70-42f1-8998-8159dc542f2c" alt=""><figcaption><p>Figure 1: SSO Identity Providers Actions Panel (Empty List)</p></figcaption></figure>

3. If you have previously exported Identity Metadata XML, click ![](https://377464071-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FXhp08OmU8050PePmMgDt%2Fuploads%2FEZuNBNlMpk9FPBc8vYnO%2FImport.gif?alt=media\&token=42728989-8d51-4bea-83c1-f5815f4bb5a9) and import the file. This will create the new Identity Provide definition.
4. Alternatively, you can click <img src="https://377464071-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FXhp08OmU8050PePmMgDt%2Fuploads%2Fgit-blob-7f816831472c5030e6dfbcb513035d87da645a67%2Fadd.png?alt=media" alt="" data-size="line"> to create a new Identity Provider definition.

<figure><img src="https://377464071-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FXhp08OmU8050PePmMgDt%2Fuploads%2FrBHjFE0wzQT2K6sPQIty%2FIdentityProviders-Create.png?alt=media&#x26;token=c04497ff-1512-49e3-891f-381c92e7aa1a" alt=""><figcaption><p>Figure 2: Create SAML Identity Provider Wizard</p></figcaption></figure>

5. Copy previously saved values to **Identity Provider Info** attributes as the following:

* **Name** - Unique Name - internal to IT-Conductor
* **Description** - Internally identifying information
* **Issuer** - Identity Provider Identifier
* **SSO URL** - Login URL
* **SLO URL** - Logout URL
* **Certificate** - exported base64 certificate

**Service Provider Info** attributes allow you to customize the mapping between Identity Provider and IT-Conductor, normally you don't need to do anything as default mappings should work. Otherwise, contact the IT-Conductor Support Team for assistance.

6. Click <img src="https://377464071-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FXhp08OmU8050PePmMgDt%2Fuploads%2Fgit-blob-7f816831472c5030e6dfbcb513035d87da645a67%2Fadd.png?alt=media" alt="" data-size="line"> again to insert the Identity Provider.
7. Verify if the identity provider was added to the SSO Identity Providers actions panel.

<figure><img src="https://377464071-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FXhp08OmU8050PePmMgDt%2Fuploads%2F8vpRKWrc2w2Wjeug0Dxt%2FIdentityProviders.png?alt=media&#x26;token=b85ef8d2-ae17-401e-b00f-bab1f5b3ff06" alt=""><figcaption><p>Figure 3: SSO Identity Providers Actions Panel (Updated List)</p></figcaption></figure>

You can now use the SSO to log into IT-Conductor from your Identity Provider.

### How to update the SSO certificate in IT-Conductor

1. On the main menu, navigate to the **Management -> Security -> SSO Identity providers**.&#x20;

{% hint style="info" %}
**Note:** Make sure you have an administrator role; otherwise, you won’t see this option.
{% endhint %}

<figure><img src="https://377464071-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FXhp08OmU8050PePmMgDt%2Fuploads%2FjAE5rPD4OadjlWIzmG2G%2Fsso-setup-001.png?alt=media&#x26;token=49cde360-6455-45d5-b9c8-a25eccaeeca0" alt=""><figcaption><p>Figure 4: SSO Identity Providers Option - Main Menu </p></figcaption></figure>

2. Click on the existing certificate entry

<figure><img src="https://377464071-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FXhp08OmU8050PePmMgDt%2Fuploads%2FfA3iI73k0siTl8baj049%2Fsso-setup-002.png?alt=media&#x26;token=a1e03376-f912-4214-9764-ba2262e95396" alt=""><figcaption><p>Figure 5: SSO Identity Providers </p></figcaption></figure>

3. Open the new certificate in a plain text editor and copy the text.
4. Paste and replace the contents of the new certificate in the **Certificate** box

<figure><img src="https://377464071-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FXhp08OmU8050PePmMgDt%2Fuploads%2FDysW2YVcTXmtQm9f0Chp%2Fsso-setup-003.png?alt=media&#x26;token=1dca2594-ef25-4c20-9724-74130fae7740" alt=""><figcaption><p>Figure 6: Update Certificate Wizard Screen</p></figcaption></figure>

{% hint style="info" %}
**Note:** Make sure that the certificate is pasted as a continuous, valid block and avoid accidental extra line breaks from editors like Notepad.
{% endhint %}

5. Click on the save <img src="https://377464071-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FXhp08OmU8050PePmMgDt%2Fuploads%2FKGMKWbeytvsPZu8WBj0y%2Fsave-icon.gif?alt=media&#x26;token=2a566496-96e3-4381-b49d-5ec8d6972f88" alt="" data-size="line"> icon
6. To authenticate that the certificate has been updated, open a private/incognito browser session and perform a full SSO login through your normal portal entry point to verify the new certificate flow works end-to-end with IT Conductor. Then confirm successful access after SAML authentication and check logs if available to ensure the login token and certificate validation succeed.
