Portal Setup

SSO - Portal Setup & Login

Configuring SSO in BlueFletch Enterprise

  1. Upon setting up the IdP to use the BlueFletch Portal as a SAML SSO app, retrieve:

    • Federation Metadata XML (see example at the bottom of the page)

    or all of the following:

    • Certificate in Base64

    • Login URL

    • Azure AD Identifier

  2. In the BlueFletch Portal, select the Admin tab, which opens to the Organization sub-tab by default.

  3. Select SSO Config and click + Add Configuration.

    Add Config
  4. In Domain field, type the company email domain that all users' email addresses will use (for example, corporate.com). The fields Name and Provider Id will auto-populate their respective details. ACS URL (Callback URL) is auto-filled by BlueFletch for all configs.

  5. Enter the value of entityID for IDP Entity Id, Location for SSO URL, and X509Certificate for Certificate. These values can be found in the metadata XML (example below). Note: when including the certificate contents, enclose within -----BEGIN CERTIFICATE----- and -----END CERTIFICATE----- tags.

  6. Enter SP Entity Id; it is the same as the auto-populated Provider Id (saml.domain_name).

  7. Click Save to save changes to the SSO configuration.

IdP Group Mappings

Optional setting that dynamically assigns BlueFletch Portal roles to users on first login based on their IdP groups.

circle-info

Requires "Groups" variable in the IdP SAML settings.

  1. Click Define IdP Group Mappings to associate an IdP user group with a role in the BlueFletch Portal; otherwise, all new SSO users will be assigned the "User" role by default.

    • Click Add New Row to add a new group-role mapping.

    • Enter an IdP group in the Group field (defining a group as "*" will apply a role to all users).

    • Select a Portal role from the Roles dropdown. For more information on Portal roles, see the Roles documentation).

    • Additional group-role mappings can be added by clicking Add New Row.

    • Click Update Groups to save group-role mappings.

    IdP Group-to-Role Mapping
  2. Click Save to save changes to the SSO configuration.

IdP Attribute Mappings

Optional setting that dynamically assigns site(s) or group(s) to users on login based on the IdP attributes listed. The Portal will assign to the user the value returned from the attribute during SSO login.

  1. Click Define IdP Attribute Mappings.

  2. Type the corresponding IdP attribute name(s) into the SiteId or Groups field, or type values into both as needed.

    Map IdP Attributes
  3. Click Update Mappings to save attribute mappings.

  4. Click Save to save changes to the SSO configuration.

circle-info

If not otherwise defined, Portal will look for the attribute names "SiteId" and "Groups" (case-sensitive) from the IdP to dynamically assign sites and security groups, respectively.

Logging into Portal with SSO

First Time User

  1. On the login page, enter email address with company-owned domain. Press Continue.

    Portal Login
  2. Page will redirect to the associated IdP's login prompt (for example, Azure in the screenshot).

  3. Enter login credentials and submit.

    IdP Sign-in Page
  4. Page will redirect to the BlueFletch Portal's loading screen before opening the organization's main dashboard with the user logged in with their group-mapped permissions.

    Loading

Common Login Problems & Solutions

  1. User cannot login with SSO because they do not have groups assigned Upon redirecting from the IdP to the BlueFletch Portal, the user receives the error message, "You do not have proper privileges for this organization."

    Error when no Groups are recognized
    • Check that the IdP has groups assigned, and that the variable in the IdP is named "Groups" (with a capital "G" - the Portal only recognizes the variable if correctly capitalized).

    • Check that all IdP groups referenced in the Portal SSO Configuration match the user's groups and are spelled correctly in the Portal.

  2. Email address is not already associated with IdP credentials The user enters email address with a company domain. The page redirects to the IdP's login prompt, but the user has no credentials for this IdP.

    • This user has not been set up by the IdP administrator yet.

    • Contact IdP administrator to create an account associated with the user's company-domain email address.

  3. SSO account is linked to Google Workspace and user is currently logged into a different Google account The user receives a 403 error, "Error: app_not_configured_for_user," while attempting to login to the BlueFletch Portal.

    • If the company uses an SSO authentication through Google Workspace, the account must be currently logged in.

    • If no Google account is logged in, user will simply be prompted to indicate their account and login.

    • If user is not logged into the SSO account but is logged into another Google-linked account, the user will get a 403 error when logging into the BlueFletch Portal. The user must login to the account through Googlearrow-up-right.

Appendix: Sample Metadata XML

Apply the following values from the XML in the SSO settings within Portal:

  • entityID -> IDP Entity ID

    • e.g. http://www.idp.com/efgxxx1234xx5

  • X509Certificate -> Certificate

    • e.g. MIIDp...pa/teCrH is included as

    -----BEGIN CERTIFICATE-----MIIDp...pa/teCrH-----END CERTIFICATE-----

  • HTTP-POST Location -> SSO URL

    • e.g. https://idp-123.com/app/idp-123_emsportal_1/efgxxx1234xx5/sso/saml

Last updated