Appcircle Login Single Sign-On (SSO) Providers Configuration
1. Introduction
Single Sign-On (SSO) allows users to log in to Appcircle using their existing credentials from an Identity Provider (IdP). By integrating SSO, organizations can streamline user access management, enhance security, and provide a seamless login experience across multiple platforms.
This document specifically covers the SSO configuration for the Appcircle Portal. Please note that a separate SSO configuration exists for the Testing Portal (Testing Distribution module) and Enterprise Store (Enterprise App Store module). This document does not cover those configurations. For more information on SSO setup for the Testing Portal and Enterprise Store, please refer to the Store and Distribution SSO Authentication Configuration Guide.
Currently, this configuration supports enabling SSO with only one identity provider at a time. Adding multiple SSO providers is not supported at this moment but may be available in the future.
The SSO setup described in this document integrates the selected identity provider with the Appcircle IAM module, essentially adding the provider as an identity source for Appcircle.
This document provides a comprehensive guide to configuring SSO with various supported identity providers, including Auth0, Microsoft Entra ID (formerly Azure Active Directory), Okta, OneLogin and Keycloak. Whether you choose to implement OpenID Connect or SAML, this guide will walk you through the necessary steps to ensure a successful integration with Appcircle.
Supported Identity Providers
- Auth0:
- Auth0 (OpenID Connect)
- Auth0 (SAML)
- Microsoft Entra ID (formerly Azure Active Directory):
- Microsoft Entra ID (SAML)
- Okta:
- Okta (OpenID Connect)
- Okta (SAML)
- OneLogin:
- OneLogin (SAML)
- Keycloak:
- Keycloak (OpenID Connect)
- Keycloak (SAML)
Each section will provide detailed instructions for configuring your chosen identity provider, including screenshots and troubleshooting tips to ensure a smooth setup process.
2. Prerequisites
Before you begin configuring SSO for Appcircle, ensure that you have the following prerequisites:
- An active account with one of the supported Identity Providers (IdPs).
- Administrative access to both the Identity Provider and Appcircle's platform. For more details, refer to the Appcircle Role Management Documentation.
- Access to SAML tracing tools or other relevant debugging resources.
- SSL certificates (if required by your IdP).
These prerequisites will ensure that the SSO configuration process is smooth and any issues that arise can be quickly resolved.
SSO Terminology
Understanding the following key terms will help you navigate the SSO configuration process more effectively:
- Identity Provider (IdP): The service responsible for authenticating the user and issuing identity information. Common examples include Auth0, Microsoft Entra ID, Okta, OneLogin, and Keycloak.
- Service Provider (SP): The service (in this case, Appcircle) that relies on the IdP to authenticate users and grant them access. The SP uses the identity information provided by the IdP to manage user sessions and permissions.
- SAML Assertion: A secure XML document sent by the IdP to the SP, containing the user's authentication and authorization information. This document is a core component of the SAML protocol, used to establish a user’s identity across different services.
- OpenID Connect Token: A token used in the OpenID Connect protocol to convey identity information from the IdP to the SP. This token typically includes user information and is crucial for establishing secure communication between the IdP and SP.
These terms form the foundation of the SSO process, where the IdP authenticates the user and the SP relies on this authentication to grant access. For more in-depth information, refer to the OpenID Connect specification or the SAML specification.
3. General Configuration Steps
The following steps outline the general process for configuring Single Sign-On (SSO) with Appcircle, applicable to all supported identity providers. These steps will guide you through the initial setup within the Appcircle dashboard and the configuration within your chosen identity provider.
Step 1: Enable SSO in Appcircle
Begin by enabling SSO within your Appcircle organization settings. Follow these steps:
- In the Appcircle dashboard, navigate to the Organization section located on the far left sidebar.
- On the My Organization screen, select Integrations from the left-hand menu.
- In the Integrations screen, find the Appcircle Login area on the far right, and click the Enable Login button.
-
The Enable SSO for Organizations window will open, presenting two options:
- Set up OpenID Provider
- Set up SAML SSO Provider
Select the option that corresponds to the identity provider you will configure.
- In the setup window, manually enter a unique Alias for your organization. This alias is used to create a custom Redirect URI that will be required for configuring your SSO provider.
- Additionally, enter a Display Name for your organization.
- After setting the alias and Display Name, Appcircle will automatically generate a Redirect URL specific to your configuration. This RedirectURL must be used in your identity provider's settings to ensure proper redirection after authentication.
Ensure that the alias and Display Name you choose are unique and easily identifiable, as they are essential for the SSO authentication process.The generated Redirect URL is crucial for your SSO setup, so be sure to copy and save it for use in the following steps.
Step 2: Select and Configure Your Identity Provider
After enabling SSO and setting your alias, proceed to select and configure your identity provider:
- Depending on the option you selected in the previous step, you will either be configuring an OpenID Connect or SAML provider.
- Follow the specific steps for your chosen provider to enter the necessary configuration details, including Client ID, Client Secret, and other required parameters.
- Use the previously generated Redirect URI provided by Appcircle when configuring your identity provider settings to ensure proper redirection after authentication.
Only one SSO provider can be configured at a time.
Step 3: SSO Login Direct Link
Appcircle also supports direct SSO login links. Use the following URL format to log in directly using your SSO alias:
- For Cloud-Hosted Appcircle:
https://my.appcircle.io/sso/{SSO_ALIAS}
- For Self-Hosted Appcircle:
https://my.appcircle.{your-domain}/sso/{SSO_ALIAS}
Replace {SSO_ALIAS}
with the alias you configured, and if you are using a self-hosted solution, replace {your-domain}
with your actual domain.
Step 4: Test and Verify SSO Configuration
After completing the SSO configuration, it's essential to test and ensure everything is functioning correctly. The following steps outline the testing process.
Step 4.1: Initiate SSO Login
- Open an incognito window in your browser to avoid any cached sessions interfering with the test.
- Navigate to the Appcircle login page and click the Continue with SSO button.
- Enter the SSO Alias you configured earlier and proceed. The alias is used to identify your organization's specific SSO setup.
Step 4.2: Account Linking
- After entering the alias, if a user with the same email already exists, you should see a confirmation screen prompting you to link your account with the SSO provider.
- Confirm the account linking by clicking the appropriate button on the confirmation screen.
- You will receive an email to verify the account linking. Open the email and click the verification link.
Step 4.3: Verification via Email
Once you confirm the account linking, an email will be sent to your registered email address. You must verify your account using the link in this email to complete the process.
- Open the verification email and click the provided link to confirm your account.
- After verification, you will be redirected back to the Appcircle dashboard, fully authenticated via SSO.
Step 4.4: Final Login
After verifying your account via email, your SSO setup is complete. From now on, you can log in with your SSO alias or using the direct SSO login link.
After enabling SSO, the traditional login method using your previous credentials will no longer be available for your organization. Ensure that you can log in successfully using SSO before logging out of any sessions.
4. Specific Provider Configuration
This section provides detailed instructions for configuring Single Sign-On (SSO) with specific identity providers supported by Appcircle. Each provider may have unique requirements, so it's important to follow the steps closely.
4.1 Auth0 (OpenID Connect)
Auth0 is a popular identity provider that supports the OpenID Connect protocol, which can be integrated with Appcircle for secure authentication.
Step 1: Create an Application in Auth0
To start, log in to your Auth0 dashboard and create a new application for Appcircle:
- In the Auth0 dashboard, navigate to the Applications section.
- Click Create Application and choose a name for your application (e.g., "Appcircle SSO - OpenID").
- Select Regular Web Applications as the application type.
- Click Create button.
- Once application created, navigate to the Settings of application.
- Take note of the Client ID and Client Secret, which will be needed later.
Step 2: Configure Callback URLs in Auth0
Next, configure the callback URLs in Auth0 to ensure proper redirection to Appcircle after authentication:
- In the Auth0 dashboard, go to the Settings tab of your application.
- In the Allowed Callback URLs field, enter the Redirect URL that was created using the alias in "Step 1: Enable SSO in Appcircle" from the "3. General Configuration Steps" section.
Example Callback URL: https://auth.appcircle.io/auth/realms/appcircle/broker/identity-{your-alias}/endpoint
- Click on the Save Changes button.
Step 3: Download OpenID Configuration from Auth0
Instead of writing all the settings of OpenID, you can download the settings file from Auth0 and import in Appcircle. Download the OpenID configuration JSON file from Auth0 with following steps.
- In the Auth0 dashboard, go to the Settings tab of your application.
- Scroll to the bottom of the page and expand the Advanced Settings section.
- Navigate to the Endpoints tab.
- Copy and open OpenID Configuration URL in different tab in your browser.
- Save OpenID Configuration as json file.
Step 4: Upload OpenID Configuration to Appcircle
Now, upload the OpenID configuration JSON file to Appcircle and complete the configuration:
- Navigate to the Set up OpenID Provider screen in Appcircle, which you accessed during the SSO setup in the "General Configuration Steps."
- Upload the downloaded OpenID configuration JSON file to Appcircle.
- Choose the Client secret sent as basic auth as Client Authentication
- Enter the Client ID and Client Secret that you noted earlier from Auth0.
- Click Save to finalize the SSO setup.
Step 5: Test the Integration
After configuring the settings, it’s crucial to test the OpenID Connect SSO integration:
Important: When connecting your Identity Provider, use an incognito window to test the SSO integration. Only log off once you are sure you can log in with your SSO credentials. If the connection fails, review your settings before logging out.
- Open a incognito window in your browser and initiate a new login session.
- On the login screen, click the Login with SSO button to start the SSO login process
- Enter your SSO alias when prompted and click Continue.
- You will be redirected to the Auth0 login screen. Enter your Auth0 credentials.
- After successful authentication, you will be redirected back to Appcircle.
- If a user with your email already exists, you will be prompted to confirm account linking. Confirm account linking and verify it via the email sent to your registered email address.
- Once you confirm the account linking, an email will be sent to your registered email address.
- Open the verification email and click the provided link to confirm your account.
- After verification, you will be redirected back to the Appcircle dashboard, fully authenticated via SSO.
4.2 Auth0 (SAML)
Auth0 supports the SAML protocol, allowing integration with Appcircle for secure authentication.
Step 1: Create a SAML Application in Auth0
To start, log in to your Auth0 dashboard and create a new SAML application for Appcircle:
- In the Auth0 dashboard, navigate to the Applications section.
- Click Create Application and choose a name for your application (e.g., "Appcircle SSO - SAML").
- Select Regular Web Applications as the application type.
- Click Create button.
Step 2: Configure SAML Settings in Auth0
Next, configure the SAML settings in Auth0 to ensure it can authenticate and redirect back to Appcircle:
- Enable the SAML addon for your Auth0 application through the Addons tab in your Auth0 application settings.
- Navigate to the Settings tab in the opened dialog. Use the following JSON settings to configure the SAML addon:
{
"nameIdentifierFormat": "urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress",
"nameIdentifierProbes": [
"http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress"
]
}
- In the Application Callback URL field, enter the Redirect URL that was created using the alias in "Step 1: Enable SSO in Appcircle" from the "General Configuration Steps" section.
Example Callback URL: https://auth.appcircle.io/auth/realms/appcircle/broker/identity-{your-alias}/endpoint
- Download the SAML metadata file from Auth0.
This metadata file will be used in the next step to configure Appcircle.
Step 3: Upload SAML Metadata to Appcircle
Now, upload the SAML metadata file to Appcircle and finalize the configuration:
- Navigate to the Set up SAML SSO Provider screen in Appcircle, which you accessed during the SSO setup in the "General Configuration Steps."
- Upload the downloaded SAML metadata file to Appcircle.
Check that the Redirect and SSO URLs are imported correctly. Ensure the X509 Certificate is imported correctly as well. If you need to enter multiple certificates, separate them with a comma. Be sure to remove any new lines or file headers, as this edit box only accepts a long base64 encoded string.
- Complete any additional configuration settings in Appcircle as required.
- Click Save to finalize the SSO setup.
Important: Ensure all settings match those provided in the SAML metadata file to avoid issues with authentication.
Step 4: Test the Integration
After configuring the settings, it’s crucial to test the OpenID Connect SSO integration:
Important: When connecting your Identity Provider, use an incognito window to test the SSO integration. Only log off once you are sure you can log in with your SSO credentials. If the connection fails, review your settings before logging out.
- Open a incognito window in your browser and initiate a new login session.
- On the login screen, click the Login with SSO button to start the SSO login process
- Enter your SSO alias when prompted and click Continue.
- You will be redirected to the Auth0 login screen. Enter your Auth0 credentials.
- After successful authentication, you will be redirected back to Appcircle.
- If a user with your email already exists, you will be prompted to confirm account linking. Confirm account linking and verify it via the email sent to your registered email address.
- Once you confirm the account linking, an email will be sent to your registered email address.
- Open the verification email and click the provided link to confirm your account.
- After verification, you will be redirected back to the Appcircle dashboard, fully authenticated via SSO.
If the test is successful, your integration is complete, and you can start using Auth0 (SAML) as your identity provider for Appcircle.
4.3 Microsoft Entra ID (SAML) (formerly Azure Active Directory)
Microsoft Entra ID supports the SAML protocol, allowing integration with Appcircle for secure authentication. This section will guide you through setting up Microsoft Entra ID as your SAML identity provider for Appcircle.
Step 1: Access Microsoft Entra and Create an Enterprise Application
First, log in to your Azure portal as an admin:
- Log in to Azure portal as an admin and navigate to Azure Services and then click Microsoft Entra ID.
- In the Azure portal, go to Enterprise Applications
- Click New Application.
- Select Create your own application, name it (e.g., "Appcircle SSO - SAML").
- Choose Integrate any other application you don't find in the gallery.
- Click Create to set up the application.
Step 2: Assign Users to the Enterprise Application
Once the enterprise application is created, you need to assign users to it:
- Navigate to the created enterprise application and click Users and Groups.
- Click Add User/Group, search for the user you want to assign, select them, and click Assign.
Step 3: Configure SAML-based Sign-on in Microsoft Entra ID
Next, configure the SAML-based sign-on for the Microsoft Entra ID application:
- In the application settings, navigate to Single sign-on and select SAML as the sign-on method.
- Click Edit under the Basic SAML Configuration section, and set the following:
- Identifier (Entity ID): Enter
https://auth.appcircle.io/auth/realms/appcircle
. - Reply URL (Assertion Consumer Service URL): Enter the Redirect URL created using the alias in "Step 1: Enable SSO in Appcircle" from the "General Configuration Steps" section (e.g.,
https://auth.appcircle.io/auth/realms/appcircle/broker/identity-{your-alias}/endpoint
).
- Click Save to apply the settings.
Step 4: Download and Upload SAML Metadata
Now, download the SAML metadata from Microsoft Entra ID and upload it to Appcircle:
- In the Azure portal, go to the SAML Signing Certificate section and download the Federation Metadata XML file.
- Navigate to the Set up SAML SSO Provider screen in Appcircle, which you accessed during the SSO setup in the "General Configuration Steps."
- Upload the downloaded Federation Metadata XML file to Appcircle.
- Review the settings and click Save to finalize the configuration.
Step 4: Test the Integration
After configuring the settings, it’s crucial to test the OpenID Connect SSO integration:
Important: When connecting your Identity Provider, use an incognito window to test the SSO integration. Only log off once you are sure you can log in with your SSO credentials. If the connection fails, review your settings before logging out.
- Open a incognito window in your browser and initiate a new login session.
- On the login screen, click the Login with SSO button to start the SSO login process
- Enter your SSO alias when prompted and click Continue.
- You will be redirected to the Auth0 login screen. Enter your Auth0 credentials.
- After successful authentication, you will be redirected back to Appcircle.
- If a user with your email already exists, you will be prompted to confirm account linking. Confirm account linking and verify it via the email sent to your registered email address.
- Once you confirm the account linking, an email will be sent to your registered email address.
- Open the verification email and click the provided link to confirm your account.
- After verification, you will be redirected back to the Appcircle dashboard, fully authenticated via SSO.
If the test is successful, your integration is complete, and you can start using Microsoft Entra ID (SAML) as your identity provider for Appcircle.
4.4 Okta (OpenID Connect)
Okta supports the OpenID Connect protocol, allowing integration with Appcircle for secure authentication.
Step 1: Create an Application in Okta
To start, log in to your Okta dashboard and create a new application for Appcircle:
- In the Okta dashboard, navigate to Applications and click Create App Integration.
- Select OIDC - OpenID Connect as the Sign In Method and Web Application as the application type.
- Once created, take note of the Client ID and Client Secret, which will be needed later.
Step 2: Configure Callback URLs in Okta
Next, configure the callback URLs in Okta to ensure proper redirection to Appcircle after authentication:
- Navigate to the settings of the created application in Okta.
- Add the Appcircle Redirect URL to the Sign-in redirect URLs field.
Example Redirect URL: https://auth.appcircle.io/auth/realms/appcircle/broker/identity-{your-alias}/endpoint
- Download the OpenID configuration JSON file from Okta using one of the following URLs:
https://{your_okta_domain}/.well-known/openid-configuration
https://{your_okta_domain}/oauth2/default/.well-known/openid-configuration?client_id={your_client_id}
Step 3: Upload OpenID Configuration to Appcircle
Now, upload the OpenID configuration JSON file to Appcircle and complete the configuration:
- Navigate to the Set up OpenID Provider screen in Appcircle, which you accessed during the SSO setup in the "General Configuration Steps."
- Upload the downloaded OpenID configuration JSON file to Appcircle.
- Check that the Authorization and Token URLs are correctly imported. Enter your Client ID and Client Secret that you noted earlier from Okta.
- Click Save to finalize the SSO setup.
Step 4: Test the Integration
After configuring the settings, it’s crucial to test the OpenID Connect SSO integration:
Important: When connecting your Identity Provider, use an incognito window to test the SSO integration. Only log off once you are sure you can log in with your SSO credentials. If the connection fails, review your settings before logging out.
- Open a incognito window in your browser and initiate a new login session.
- On the login screen, click the Login with SSO button to start the SSO login process
- Enter your SSO alias when prompted and click Continue.
-
You will be redirected to the Auth0 login screen. Enter your Auth0 credentials.
-
After successful authentication, you will be redirected back to Appcircle.
-
If a user with your email already exists, you will be prompted to confirm account linking. Confirm account linking and verify it via the email sent to your registered email address.
- Once you confirm the account linking, an email will be sent to your registered email address.
- Open the verification email and click the provided link to confirm your account.
- After verification, you will be redirected back to the Appcircle dashboard, fully authenticated via SSO.
If the test is successful, your integration is complete, and you can start using Okta (SAML) as your identity provider for Appcircle.
4.5 Okta (SAML)
Okta supports the SAML protocol, allowing integration with Appcircle for secure authentication.
Step 1: Create a SAML Application in Okta
To start, log in to your Okta dashboard and create a new application for Appcircle:
- In the Okta dashboard, navigate to Applications and click Create App Integration.
- Select SAML 2.0 as the Sign In Method.
- Pick a name and optional logo for the app, then click Next.
Step 2: Configure SAML Settings in Okta
Next, configure the SAML settings in Okta to ensure proper authentication and redirection to Appcircle:
- In the Single sign-on URL field, add the Appcircle Redirect URL.
Example URL: https://auth.appcircle.io/auth/realms/appcircle
- For the Audience URI (SP Entity ID) field, use the same URL.
- Select EmailAddress for the Name ID format.
- Instead of manually configuring all SAML settings in Appcircle, you can download the SAML metadata XML file from Okta:
Click the Copy button next to the Metadata URL and open it in another tab to download the XML file.
Step 3: Upload SAML Metadata to Appcircle
Now, upload the SAML metadata XML file to Appcircle to complete the configuration:
- Navigate to the Set up SAML SSO Provider screen in Appcircle, which you accessed during the SSO setup in the "General Configuration Steps."
- Upload the downloaded SAML metadata XML file to Appcircle.
-
Ensure that the Redirect and SSO URLs are imported correctly. You can check if the X509 Certificate is imported correctly as well. If you want to enter multiple certificates you can separate them by using a comma between them. Please be aware that you need to remove any new lines or file headers from this edit box. This edit box only accepts a long base64 encoded string.
-
Click Save to finalize the SSO setup.