How To Configure Single Sign-On Within Experiences Using Active Directory

We now have a template for this! While this guide remains valid, you might find it easier to use our Azure Active Directory SSO Template.

End-User Experiences allow you to develop and publish custom APIs and user interfaces with built-in user management and authentication. Each Experience has its own set of Users, Groups, and Domains. Using Experiences, you can enable your Experience Users to authenticate to an Experience using Single Sign-On (SSO) with Azure Active Directory.

In this guide, you will use the SAML: Login Node and SAML: Verify Node to enable SSO within an Experience. Though this guide uses Azure Active Directory, these instructions apply to most SAML Identity Providers.

SAML Login Workflow

Prerequisites

Before you begin, you need:

How It Works

When complete, you will have implemented the following logic:

  1. An Experience User navigates to an Experience Endpoint: GET /saml/login.
  2. The /saml/login Experience Endpoint triggers an Experience Workflow. This workflow generates an Active Directory SSO URL and redirects the user.
  3. The Experience User can then authenticate to Active Directory. After a successful login, the user is redirected back to a Losant Experience Endpoint: POST /saml/assert.
  4. The /saml/assert Experience Endpoint verifies the request and authorizes the user by setting the authorization cookie.

If you’re unfamiliar with SAML-based SSO, here are some resources to help:

Getting an Endpoint URL

To follow along, you’ll need a Losant Experience with an Endpoint URL. You can acquire this in three ways:

Once you have an experience, you can find the URL on the “Edit” page within the Experiences Menu:

"Endpoint Url"

SAML Configuration

Before you can configure SSO, you first must prepare the proper configuration for the SAML: Login Node and SAML: Verify Nodes.

The two nodes share a common configuration. They both require a:

SAML: Login URL Node Configuration

Service Provider Metadata Template

The Service Provider Metadata Template describes the service provider, which in this case is your Losant Experience. Here is an example configuration:

<EntityDescriptor
  xmlns:md="urn:oasis:names:tc:SAML:2.0:metadata"
  xmlns:saml="urn:oasis:names:tc:SAML:2.0:assertion"
  xmlns:ds="http://www.w3.org/2000/09/xmldsig#"
  entityID="ENTITYID"
>
  <SPSSODescriptor
    protocolSupportEnumeration="urn:oasis:names:tc:SAML:2.0:protocol"
  >
    <!-- insert ds:Signature element (omitted) -->
    <NameIDFormat
    >urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress</NameIDFormat>
    <AssertionConsumerService
      isDefault="true"
      index="0"
      Binding="urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST"
      Location="REDIRECT_URL"
    />
  </SPSSODescriptor>
</EntityDescriptor>

You may use this example or update it to support any application-specific requirements.

Following from the example, you must update the following values:

  • ENTITYID: A globally unique name for an Identity Provider or a Service Provider. Depending on your environment, there may be a specific entityId required. However, in this example, you may set this value to your Experience URL.
  • REDIRECT_URL: Set to the value of [Your experience url]/saml/assert. For example, if your Experience URL was https://5f3ac1c2d1b1a400075cb42a.onlosant.com the value you would configure would be https://5f3ac1c2d1b1a400075cb42a.onlosant.com/saml/assert.

Identity Provider Metadata Template

Next, you need to acquire an Identity Provider Metadata Template from the identity provider, which in this case is Active Directory:

  1. Add an application to your Azure Active Directory.
  2. Set up single sign-on (SSO) for an application in your Azure Active Directory.
  3. Download the “Federation Metadata XML.” You can find this within your Azure Active Directory single sign-on application settings:

Federation Metadata XML

  1. Create or give a user access to the application within Active Directory.

Setting Global Configuration

It’s best practice to use application globals to store application-wide configuration that may be used across multiple workflows, like phone numbers or API keys. Application globals are a set of key/value pairs that are accessible inside of a workflow.

In this case, you can use them to store the SSO configuration to be used later within the SAML Nodes.

Application Globals

Building SAML Workflows

For this use case, you are going to create two Experience Workflows:

  • GET /saml/login: This route redirects the user to Active Directory to log in.
  • POST /saml/assert: After attempting to login to Active Directory, the user will be redirected to this route.

SAML Login Workflow

This route redirects the user to Active Directory. To create the Experience Endpoint and Workflow:

  1. Create an Experience Endpoint using the Experience Endpoint Wizard.
  2. Select “Return data for an API.”
  3. Set the “Method” to GET.
  4. Set the “Route” to /saml/login.
  5. Select “Create a new Workflow.”
  6. Select “All public users/custom authentication.”

Once done, your workflow will look similar to:

SAML Login Workflow

To update this Experience Workflow:

  1. Navigate to the GET /saml/login Experience Workflow.
  2. Connect a SAML: Login URL Node between the Endpoint Trigger and the Endpoint Reply Node.

To configure the SAML: Login Node:

  1. Set the “Service Provider Metadata Template (XML)” to {{globals.serviceProviderMetadataTemplate}}.
  2. Set the “Identity Provider Metadata Template (XML)” to {{globals.identityProviderMetadataTemplate}}.
  3. Set the “Result Path” to working.samlUrl.

To configure the Endpoint Reply Node:

  1. Set the “Reply Type” to Redirect.
  2. Set the “Response Code” to 302 (Temporary).
  3. Set the “URL Source” to String Template.
  4. Set the “URL Template” to {{working.samlUrl.redirectUrl}}.

Endpoint Reply

Now, the SAML Login workflow is complete.

SAML Assert Workflow

After attempting to log in to Active Directory, the user will be redirected to this route. This route needs to perform the following actions:

  • Check whether the authentication was successful.
  • Associate the authenticated user to an Experience User.
  • Authenticate the Experience User for Losant Experiences.

To create the Experience Endpoint and Workflow:

  1. Create an Experience Endpoint using the Experience Endpoint Wizard.
  2. Select “Return data for an API.”
  3. Set the “Method” to POST.
  4. Set the “Route” to /saml/assert.
  5. Select “Create a new Workflow.”
  6. Select “All public users/custom authentication.”

When complete, the workflow will look similar to:

SAML Verify Workflow

To update this Experience Workflow:

  1. Navigate to the POST /saml/assert Experience Workflow.
  2. Connect a SAML: Verify Node to the Experience Endpoint Trigger.
  3. On the left path of the SAML: Verify Node, connect an Endpoint Reply and Debug Node.
  4. On the right path of the SAML: Verify Node, connect a Mutate Node.
  5. Connect a User: Get Node to the Mutate Node.
  6. Connect a Conditional Node to the User: Get Node.
  7. On the left path of the Conditional Node, connect a User: Create Node.
  8. On the right path of the Conditional Node, connect a Generate Token Node.
  9. Connect an Endpoint Reply Node and a Debug Node to the Generate Token Node.

To configure the SAML: Verify Node:

  1. Set the “Service Provider Metadata Template (XML)” to {{globals.serviceProviderMetadataTemplate}}.
  2. Set the “Identity Provider Metadata Template (XML)” to {{globals.identityProviderMetadataTemplate}}.
  3. Set the “SAML Response Template” to {{data.body.SAMLResponse}}.
  4. Set the “Result Path” to working.samlUser.

If the SSO fails, this node allows you to redirect the user to the most appropriate page. If the SSO succeeds, the workflow can continue to log in the user.

To configure the Mutate Node:

  1. Select “Set a new value.”
  2. Set the “Value Template” to:
{{working.samlUser.attributes.[http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress]}}
  1. Set the “Destination Path” to working.emailAddress.

The Mutate Node allows you to move a value on the payload from one place to another. It’s useful to avoid long payload paths. In this example, the Mutate Node is moving the email address of the user to working.emailAddress. The email address is returned from the Identity Provider.

To configure the User: Get Node:

  1. Set “Find By” to “Email or User ID.”
  2. Set the “Experience User ID or Email Template” to working.emailAddress.
  3. Set the “Result Path” to working.experienceUser.

This allows you to check if an Experience Users exists with the same email provided by Active Directory.

To configure the Conditional Node:

  1. Set “Expression” to {{working.experienceUser}}.

This node allows you to branch the workflow in separation actions based on whether an Experience User was found.

To configure the User: Create Node:

  1. Set “Email Address Template” to working.emailAddress.
  2. Set “Password Template” to {{working.samlUser.nameID}}.

If the user does not exist, you can automatically create a new Experience User with the details provided by Active Directory.

To configure the Generate Token Node:

  1. Set “User ID or Email Template” to working.emailAddress.
  2. Set “Result Path” to data.responseToken.

If the Experience User does exist, or after we create one, you can generate a valid authentication.

To configure the Endpoint Reply Node:

  1. Set the “Reply Type” to Redirect.
  2. Set the “Response Code” to 302 (Temporary).
  3. Set the “URL Source” to String Template.
  4. Set the “URL Template” to /.
  5. In the “Reply Cookies” section, select “Set Cookie.”
  6. Set the “Name Template” to authorization.
  7. Set the “Value Template” to data.responseToken.
  8. Set the “Path Template” to /.

Endpoint Reply Verify

Now, the SAML Verify workflow is complete.

Verifying and Next Steps

If everything was configured properly, you will be able to perform the following:

  1. Navigate to /saml/login.
  2. Log in to Active Directory.
  3. Redirect to the / (home) page of your Experience.

Here are some helpful tips to help you debug any issues:

Verify Workflow

Adding Debug Nodes allows inspection of the current payload at any point during a workflow. It is extremely useful when initially constructing a workflow to make sure that all the various components are acting on the payload as expected.

Debug Node Output

Testing Experience

For debugging purposes, Losant provides an Experience Render Log of render attempts for your experience views. This log creates an entry for every attempted page render (including failures).

Render Logs

Was this page helpful?


Still looking for help? You can also search the Losant Forums or submit your question there.