Configuring SAML

Overview

While OpenID Connect is a modern and recommended protocol, many organizations continue to rely on SAML, which remains widely adopted and supported by most identity providers. To improve compatibility with existing enterprise environments, Login Enterprise supports SAML-based SSO in addition to OpenID Connect.

SAML provides a standardized, identity provider–agnostic approach. If an identity provider supports SAML, it can typically be integrated without provider-specific configuration. In contrast, OpenID Connect integrations may involve provider-specific differences at the implementation level, although the configuration experience for users is often similar across providers.

This section describes how to configure SAML-based SSO in Login Enterprise. The examples use Okta as the identity provider. Steps may vary depending on your provider, such as Microsoft Entra ID or others.

SAML SSO in Login Enterprise supports both identity provider (IdP)-initiated and service provider (SP)-initiated login flows.

How SAML Works

After SAML is configured:

  • Users are redirected to the identity provider for authentication.

  • If the user already has an active session with the identity provider, they are signed in automatically.

  • Otherwise, the user is prompted to enter their credentials.

User access in Login Enterprise is determined by the roles assigned to the user. For details, see Role-Based Access Control (RBAC).

Prerequisites

Before configuring SAML-based SSO, ensure that the following requirements are met:

  • An LDAP configuration is in place. For more information, see Configuring Authentication.

  • An identity provider (such as Okta) is configured.

  • A SAML application is created in your identity provider.

  • Users and/or groups are assigned to the application in your identity provider.

  • You have obtained the following values from your identity provider:

    • Identity Provider metadata URL

    • Identity Provider identifier (issuer)

    • Signing certificate or key

For instructions on creating and configuring a SAML application in Okta, see the Okta documentation.

Configuring SAML in Login Enterprise

  1. Sign in to Login Enterprise using an account with administrative privileges.

    1. Using a local admin account is recommended to prevent potential lockout if SSO is misconfigured.

  2. In the Login Enterprise sidebar menu, navigate to Access Control > SSO configuration.

  3. Configure the following:

Note: Before configuring the Identity Provider fields, obtain the required values from your identity provider. These values are typically available in the provider’s SAML application settings or metadata. Because the exact steps and field names vary by provider, refer to your identity provider’s documentation.

Protocol

Type

The protocol used for SSO. For SAML, select the SAML 2.0 radio button.

General

Enable SSO login

When disabled, the SSO login option isn’t available on the login page.

Enforce SSO login

When enabled, users can sign in only with SSO or a local admin account.

Identity Provider configuration

Identity Provider Metadata Location

The URL to the SAML metadata XML provided by your identity provider.

Identity Provider Identifier

The unique identifier of your identity provider in the SAML configuration.

Identity Provider Signing Certificate / Key

The signing certificate or key used to validate SAML responses from the identity provider.

Service Provider configuration

Service Provider Identifier

The Assertion Consumer Service URL that the identity provider redirects users back to after sign-in.

Reply URL

The Assertion Consumer Service URL that the identity provider redirects users back to after sign-in.

Frame 2092.png
  1. Save the configuration.

Testing the Configuration

After you configure SAML-based SSO, verify that authentication works as expected.

  1. Sign out of Login Enterprise.

  2. Select Log in with SSO.

Frame 2094.png
  1. You are redirected to your identity provider's sign-in page (for example, Okta).

    1. If you already have an active session with your identity provider, you are signed in automatically.

    2. Otherwise, you are prompted to enter your credentials.

Frame 2096.png
  1. Optionally, confirm that you’re assigned the correct roles based on LDAP group membership.