title |
---|
Single Sign-On (SSO) |
Vantage supports single sign-on (SSO) via self-service single sign-on as well as several other supported IdPs. You can use self-service SSO to connect your SAML (Security Assertion Markup Language) Identity Provider (IdP) to your Vantage account. With self-service SSO, you can use your existing credentials to authenticate and access your Vantage account. SSO streamlines the login process since users don't need to create a new account or remember another set of login credentials for Vantage.
Vantage uses Just-in-Time (JIT) provisioning for user provisioning. As long as a user is granted access to your IdP, the user will be provisioned an account in Vantage when they first log in.
Currently, Vantage supports self-service connection for SAML. If you'd like to connect one of the other supported IdPs (e.g., Google Workspace or Windows Active Directory), view the instructions below. If you do not see your IdP listed, contact [Vantage Support](mailto:[email protected]).SAML is an XML-based open standard for exchanging authentication and authorization data between parties. It enables secure and standardized communication between identity providers, service providers, and users. SAML allows for seamless and secure access to web applications and services.
Before you can connect your IdP to Vantage, you will need the following:
- A valid account with a SAML IdP
- Owner role access to Vantage
- Your IdP's signing certificate and sign-on URL
- From the Vantage console, navigate to the Authentication page.
- Click New Connection.
- Select the SAML connection type.
- Copy the Single Sign-On URL and Audience URL that are provided on screen. You will need both of these URLs for your IdP's configuration.
- To add a logo to your connection's thumbnail, use the provided Vantage Logo.
- Once you create the Vantage application within your IdP, copy the following information:
- Copy the SAML Sign-On URL provided by your IdP, then paste it into the SAML 2.0 Endpoint field of the Vantage SAML page.
- Copy the Signing Certificate provided by your IdP, then paste it into the Public Certificate field of the Vantage SAML page.
- Ensure you've entered the correct credentials, then click Create Connection. You'll be redirected back to the Authentication page, where you will be able to see your connection.
- To enable the connection, switch the Active toggle to on. You will remain logged in to Vantage, but the next time you attempt to log in, you will be redirected to your IdP's sign-on page.
- Optional: If you would like to set up SSO group mappings based on your existing Vantage teams, see the SSO Group Mappings instructions below.
If you want to use an IdP-initiated session configuration, please contact Vantage Support.
For detailed instructions, see the [Okta support documentation](https://help.okta.com/oie/en-us/content/topics/apps/apps_app_integration_wizard_saml.htm).- Create an app integration on Okta.
- For Sign-in method, select SAML 2.0. Click Next.
- For App Name, enter Vantage.
- For App Logo, upload the Vantage Logo, then click Next.
- Enter the requested Single sign on URL (for example,
https://auth.vantage.sh/login/callback?connection=company-com
) and Audience URI (SP Entity ID) (for example,urn:auth0:vantage-production:company-com
), provided on the Vantage Authentication setup page. - Set the Application username to Email.
- Once the app integration is set up, copy the Okta-provided Identity Provider Single Sign On URL and X.509 Certificate back into Vantage.
- To enable the connection, switch the Active toggle to on. You will remain logged in to Vantage, but the next time you attempt to log in, you will be redirected to the Okta sign-on page.
The recommended steps for testing your SSO configuration are as follows:
- Once your connection is enabled, do not close or log out of your current Vantage application session.
- Open a private browser or incognito window, and visit https://console.vantage.sh.
- Enter your email address. If your SSO connection is configured correctly, you will be redirected to your IdP.
- Enter your login credentials. If you can complete the login, your configuration is correct.
If you experience any issues with logging in after you've enabled your connection, contact Vantage Support.
If you ever need to disconnect your IdP from Vantage:
- Navigate to the Authentication page.
- To disable your connection, switch the Active toggle off. To permanently remove your IdP, click the Delete button.
After disabling/removing the connection, you will be able to log in to the app with your original Vantage login credentials.
If you do not see your IdP listed, please contact [Vantage Support](mailto:[email protected]). The following instructions are based on the [Microsoft documentation](https://learn.microsoft.com/en-us/azure/active-directory/develop/quickstart-register-app).- From the Azure portal, navigate to App registrations, then click New registration.
- Enter a name for your app (e.g., Vantage).
- Set the Supported account types option to the appropriate setting for your organization.
- For Redirect URI, select Web and enter
https://auth.vantage.sh/login/callback
. - Click Register.
- Once the app registration is complete, copy the Application (client) ID displayed on the app's Overview page to send to Vantage.
-
On the left navigation, select Certificates & secrets.
-
Under the Client secrets tab, click New client secret.
-
Enter a description and select an expiration for the secret.
If this secret expires, you will need to supply Vantage with a new secret _before_ the expiration date. -
Click Add.
-
Copy the secret's Value.
- On the left navigation, select API permissions.
- Select Add a permission.
- Under the Microsoft APIs tab, find and select the appropriate permissions required by Vantage (e.g.,
Directory.Read.All
,User.Read
). - At the bottom, click Add permissions.
- Still under API permissions, you may see a section for Grant admin consent for {your domain}.
- Click Grant admin consent, and follow the prompts.
Contact Vantage Support for information on how to send the following items to finish the connection with the Vantage app:
- Application (client) ID
- Client secret
- Azure AD Domain
After your connection is complete, if you would like to set up SSO group mappings based on your existing Vantage teams, see the SSO Group Mappings instructions below.
The following instructions are based on the [Google documentation](https://support.google.com/googleapi/answer/6158849).-
From the Google API Console, select an existing project or click CREATE PROJECT.
-
From the left navigation menu, click Credentials.
-
At the top, click CREATE CREDENTIALS > OAuth client ID.
If this is your first time working with this Google project, you will have to configure your consent screen. Follow the Google documentation linked above. -
For Application type, select Web application.
-
Enter a Name for your application (e.g., Vantage).
-
For Authorized JavaScript origins, click ADD URI and enter
https://auth.vantage.sh
. -
For Authorized redirect URIs, click ADD URI and enter
https://auth.vantage.sh/login/callback
. -
Click CREATE.
- Copy your app's CLIENT ID and CLIENT SECRET.
- Contact Vantage Support for information on how to send these credentials to finish connecting with the Vantage app.
After your connection is complete, if you would like to set up SSO group mappings based on your existing Vantage teams, see the SSO Group Mappings instructions below.
Vantage is available in the Rippling App Shop, where you can find instructions for connecting your Vantage account to Rippling.
With the SSO Team Assignment feature, you can automatically assign users to Vantage teams that match the name of a corresponding SSO group.
To use the SSO Team Assignment feature, you will need to have teams already set up in Vantage. See the Role-Based Access Control: Create Teams documentation for information on how to create teams in Vantage.
- From the top menu of the Vantage console, click Settings.
- On the left navigation menu, select Authentication. You will see your SSO connection listed.
- In the SSO Team Assignment section of the connection, click the toggle button to enable the feature.
Vantage will match SSO groups to Vantage teams based on the case-sensitive name of the SSO group. If a team name in Vantage matches an SSO group name, the user will be placed into that team in Vantage. Users will be mapped into the appropriate teams during their next login.
After the SSO Team Assignment setting is enabled, users will be removed from Vantage teams that are not present in the SSO groups. If you want to modify this behavior, contact [[email protected]](mailto:[email protected]). The Everyone team will remain unchanged.If your team names in Vantage do not match your identity provider, or you want multiple groups to be added to the same team, you can create custom mappings.
- To create custom mappings, click the Show dropdown menu next to Custom Mappings.
- In the SSO Group Name column, enter the group names from your SSO provider. The SSO Group Name you enter should match the corresponding name in your identity provider. Note that the mapping is case-sensitive.
- From the Vantage Team dropdown, select the corresponding Vantage team.
- Click Add to add additional mappings.
- When you are finished, click Save.
Vantage uses the groups
field in the SSO payload for matching SSO groups to Vantage teams. As long as your identity provider can pass a groups
attribute in the payload, you can use SSO group mapping. For some providers, like Okta, you may need to enable group mapping.
To enable group mapping in Okta:
- Navigate to the Vantage SAML application in Okta.
- Edit your SAML Settings.
- For Name, enter
groups
. - If you would like to pass through all groups, set the Filter to Matches regex with a value of
.*
.