Integrating Auth0 With OneLogin SSO SAML response
Using OneLogin to enable single sign-on in auth0. This SSO configuration forces you to utilize auth0 and a OneLogin credential. For instance: When a company uses Azure Active Directory as their provider, they can access auth0 using their OneLogin credentials.
OneLogin SAML Configration:
- Log in to the OneLogin Dashboard, and click Apps > Add Apps.
- Search for SAML, and select SAML Test Connector (IdP w/attr).

3. When prompted, change the Display Name of your app.
4. Click SAVE.
5. Go to the SSO tab, and copy the values for SAML 2.0 Endpoint (HTTP) and SLO Endpoint (HTTP).
6. Click on the View Details link at the X.509 Certificate field.
7. Download the X.509 certificate onelogin.pem.
Configure Auth0 connection
- Go to Dashboard > Authentication > Enterprise > SAMLP and click the plus icon to be redirected to the page that allows you to create a new Connection.
- You will be prompted to provide the appropriate configuration settings for this Connection. The only mandatory fields are:

3. Click Save to proceed.
4. In the next window, you’ll be provided two options.
If you are a domain administrator, you can click Continue for additional instructions on SAML Identity Provider Configuration.
If you are not, you can give your domain administrator the provided URL so that they can finish the configuration.
Auth0 configuration values
To finish configuration of the SAML application, the admin will need the following information regarding Auth0:
- SAML Consumer URL: https://YOUR_DOMAIN/login/callback
- SAML Audience: urn:auth0:YOUR_TENANT:YOUR_CONNECTION_NAME
Also copy the values of the post-back URL and the Entity ID before heading back to the Configuration tab of your OneLogin app:

Also provide a valid regular expression for the ACS (Consumer) URL Validator. For example:
[-a-zA-Z0–9@:%._\+~#=]{2,256}\.[a-z]{2,6}\b([-a-zA-Z0–9@:%_\+.~#?&//=]*)
Test connection
Before testing your connection:
- Be sure that you have a OneLogin user that you can use for testing. If not, go to the Users tab on the OneLogin dashboard and add one
- Be sure that your new Auth0 SAMLP connection has been associated with an application (otherwise you will get an invalid_request: the connection was disabled error)
Next to your SAML connection, click the Try button. If all goes well, you will be redirected to a page informing you that the connection works.
Reference


Error Reference:

Solution: Enable the Application connection and try.
Auth0 with Angular Integration: https://medium.com/@prem__kumar/auth0-with-angular-integration-e5fec997a087
Create Auth0 SPA: https://medium.com/@prem__kumar/auth0-single-page-application-8c01d6f33926
Integrating Auth0 with Azure Active Directory SAML response: https://medium.com/@prem__kumar/integrating-auth0-with-azure-active-directory-saml-response-d5a91fdc8279
Integrating Auth0 With Okta SSO SAML response: https://medium.com/@prem__kumar/integrating-auth0-with-okta-sso-saml-response-4514c2dac4a3
Drop your questions in the commands or send an email to k.prem3009@gmail.com for further clarification.
Comments
Post a Comment