This section of the application is where you can optionally configure third-party services to act as identity providers for the DeepSurface web console. Once an authentication provider is created, existing or new user accounts can be associated with the new provider, causing DeepSurface to use the provider to authenticate those specific user accounts.
To access the authentication providers page, navigate to Setup > Authentication > Providers, which should present a page like:
Click on the big '+ Authentication Provider' button to add an authentication provider. You will see a screen like the following.
If you have any SAML 2.0 authentication providers configured, you may choose to allow DeepSurface to automatically create a user that exists in your IDP of choice. At this time, we allow you to choose one SAML 2.0 Authentication provider to be configured at a time.
The following are generic guidelines that apply to any Id provider you might want to set up.
Whenever prompted for the entity id for your saml application, enter the full Assertion Consumer Service URL as given in the Add Authentication provider form.
To ensure a good matching between user data in DeepSurface and in your identity provider some attributes mapping is required. The following table summarizes what mapping would suffice to get the best onboarding possible for new users.
DeepSurface attributes | IdProvider attributes |
---|---|
saml_subject | Username |
emailaddress | Email Address |
givenname | Given Name |
surname | Family Name |
Each authentication provider type has somewhat unique behaviors and requirements that you can learn more about in the provider's specific documentation page, as listed below:
The Lightweight Directory Access Protocol (LDAP) can be used to communicate with Microsoft Active Directory service to authenticate web console users. Under this authentication provider configuration, a user's username and password must match their domain username and password exactly.
DeepSurface can be configured to leverage a third-party identity provider (IdP) to authenticate users when they access the DeepSurface web management console. One option is to use Microsoft's Azure Active Directory as SAML-based IdP that is available with an Azure subscription. Use the following steps to create a new DeepSurface Authentication Provider configuration to enable this integration.
Create the Authentication Provider record in DeepSurface
Navigate to Setup > Authentication > Providers
Click the button "+ Authentication Provider" in the top-right of the screen
In the pop-up, select "SAML 2.0" in the drop-down
Fill in an appropriate label for this authentication provider (such as "Azure AD")
Enter an appropriate value for the domain name of the "ASSERTION CONSUMER SERVICE URL" field. This domain name must match the one users will navigate to when accessing DeepSurface.
Click the "copy to clipboard" icon next to the ASSERTION CONSUMER SERVICE URL field to make a copy of this ACS URL. Paste this in a temporary location, such as a text editor, as we'll need this in later steps.
Do not enter any values in the METADATA XML at this stage. We'll come back to this in a minute.
Save the new authentication provider.
Configure Azure AD
Log in to Azure Portal and navigate to Azure Active Directory from the Azure services menu.
Click on the Enterprise Applications in the left hand menu and click on the "+ New application button".
Enter a friendly name in the App name field, such as "DeepSurface". Select other options as appropriate and click Next.
Once the app is created and you are on the app's setup screen, click on the "Single Sign On" menu item on the left.
You will see several panes, the first one to focus on is the "Basic SAML Configuration" pane, click the "Edit" icon in the top left of this pane to edit the details
In the edit form, enter the ASSERTION CONSUMER SERVICE URL you obtained in step 1 above into both the Identifier (Entitiy ID) and Reply URL (Assertion Consumer Service URL) fields. Optionally, you can add the login URL, but this is probably not necessary for this configuration. Do not modify any other fields.
Finalize DeepSurface Authentication Provider
Return to the Setup > Authentication > Providers area in DeepSurface and edit the provider created in step 1l
Upload or paste the XML file into the METADATA XML field, as obtained from Azure AD in step 2.
Save the updated authentication provider record.
Create DeepSurface users associated with the Azure AD authentication provider
In DeepSurface, navigate to Setup > Authentication > Users.
For any user who needs to log in via Azure AD, create a user with exactly the same username they would use with Azure AD. Be sure to select your newly created authentication provider in the dropdown at the top of the user editing pop-up.
Test Azure-based login
To test a DeepSurface user linked with an Azure AD authentication provider, first log out of DeepSurface.
On the login form, enter the username of a user who should be authenticated against Azure AD, and click Next.
You should now be redirected to Azure AD. Log in with your Azure AD credentials.
After successfully authenticating to Azure AD, your browser should be redirected back to DeepSurface and you should be automatically logged in to the DeepSurface console.
For more information, consider consulting the following:
Having trouble? Don't hesitate to contact support.
DeepSurface can be configured to leverage a third-party identity provider (IdP) to authenticate users when they access the DeepSurface web management console. One option is to use Google's service as SAML-based IdP that is available with a G Suite subscription. Use the following steps to create a new DeepSurface Authentication Provider configuration to enable this integration.
Create the Authentication Provider record in DeepSurface
Navigate to Setup > Authentication > Providers
Click the button "+ Authentication Provider" in the top-right of the screen
In the pop-up, select "SAML 2.0" in the drop-down
Fill in an appropriate label for this authentication provider (such as "Google")
Enter an appropriate value for the domain name of the "ASSERTION CONSUMER SERVICE URL" field. This domain name must match the one users will navigate to when accessing DeepSurface.
Click the "copy to clipboard" icon next to the ASSERTION CONSUMER SERVICE URL field to make a copy of this ACS URL. Paste this in a temporary location, such as a text editor, as we'll need this in later steps.
Do not enter any values in the METADATA XML at this stage. We'll come back to this in a minute.
Save the new authentication provider.
Configure Google
Log in to G Suite's admin interface and navigate to Apps > Overview > Web and mobile apps.
Click the "Add App" dropdown and select "Add custom SAML app".
Enter a friendly name in the App name field, such as "DeepSurface". Select other options as appropriate and click Next.
Next, click the "Download Metadata" button and save this file for use in Step 3 below.
On the Google screen, enter the ASSERTION CONSUMER SERVICE URL you obtained in step 1 above into both the ACS URL and Entity ID fields. Do not modify any other fields, and then click Next.
On the fourth Google screen, you may click Finish without any other changes.
Next, you should arrive at a summary screen for your newly created SAML app. Click on the "User access" tile to grant users access to the DeepSurface application in Google. You may either enable the app for everyone, or use the panel on the left side to search for specific Google Groups or users and grant access to those groups and users selectively. Save your selections when completed.
Finalize DeepSurface Authentication Provider
Return to the Setup > Authentication > Providers area in DeepSurface and edit the provider created in step 1l
Upload or paste the XML file into the METADATA XML field, as obtained from Google in step 2.
Save the updated authentication provider record.
Create DeepSurface users associated with the Google authentication provider
In DeepSurface, navigate to Setup > Authentication > Users.
For any user who needs to log in via Google, create a user with exactly the same username they would use with Google. Be sure to select your newly created authentication provider in the dropdown at the top of the user editing pop-up.
Test Google-based login
To test a DeepSurface user linked with an Google authentication provider, first log out of DeepSurface.
On the login form, enter the username of a user who should be authenticated against Google, and click Next.
You should now be redirected to Google. Log in with your Google credentials.
After successfully authenticating to Google, your browser should be redirected back to DeepSurface and you should be automatically logged in to the DeepSurface console.
For more information, consider consulting the following:
Having trouble? Don't hesitate to contact support.
DeepSurface can be configured to leverage a third-party identity provider (IdP) to authenticate users when they access the DeepSurface web management console. One option is to use Okta's service as SAML-based IdP. Use the following steps to create a new DeepSurface Authentication Provider configuration to enable this integration.
Create the Authentication Provider record in DeepSurface
Navigate to Setup > Authentication > Providers
Click the button "+ Authentication Provider" in the top-right of the screen
In the pop-up, select "SAML 2.0" in the drop-down
Fill in an appropriate label for this authentication provider (such as "Okta")
Enter an appropriate value for the domain name of the "ASSERTION CONSUMER SERVICE URL" field. This domain name must match the one users will navigate to when accessing DeepSurface.
Click the "copy to clipboard" icon next to the ASSERTION CONSUMER SERVICE URL field to make a copy of this ACS URL. Paste this in a temporary location, such as a text editor, as we'll need this in later steps.
Do not enter any values in the METADATA XML at this stage. We'll come back to this in a minute.
Save the new authentication provider.
Configure Okta
Log in to your Okta portal and navigate to Applications > Applications > Create App Integration
Select SAML 2.0 and click Next
Enter a friendly name in the App name field, such as "DeepSurface". Select other options as appropriate and click Next.
On the Okta screen, enter the ASSERTION CONSUMER SERVICE URL you obtained in step 1 above into both the Single sign on URL and Audience URI (SP Entity ID) fields. Do not modify any other fields, and then click Next.
On the third Okta screen, answer the feedback questions as appropriate and click Finish.
Next, you should arrive at the new application's "Sign On" tab. In this area, find the link for "Identity Provider metadata" and download it. You may need to right click on the link and select "Save link as..." Store this in a file for use in Step 3 below.
Finalize DeepSurface Authentication Provider
Return to the Setup > Authentication > Providers area in DeepSurface and edit the provider created in step 1.
Upload or paste the XML file into the METADATA XML field, as obtained from Okta in step 2.
Save the updated authentication provider record.
Create DeepSurface users associated with the Okta authentication provider
In DeepSurface, navigate to Setup > Authentication > Users.
For any user who needs to log in via Okta, create a user with exactly the same username they would use with Okta. Be sure to select your newly created authentication provider in the dropdown at the top of the user editing pop-up.
Test Okta-based login
To test a DeepSurface user linked with an Okta authentication provider, first log out of DeepSurface.
On the login form, enter the username of a user who should be authenticated against Okta, and click Next.
You should now be redirected to Okta. Log in with your Okta credentials.
After successfully authenticating to Okta, your browser should be redirected back to DeepSurface and you should be automatically logged in to the DeepSurface console.
For more information, consider consulting the following:
Having trouble? Don't hesitate to contact support.