Save as PDF

OneLogin SAML Configuration

Overview

SAML Authentication is a paid add-on feature and must be enabled prior to use. Contact your account manager, or accountmanagers@responsive.io, to enable it.

OneLogin gives users the ability to access the applications and other resources they need to do their job by logging in once to a single interface.

Select the applicable tab for your edition of Responsive.

  • Configuring OneLogin

    1. Login to OneLogin using valid credentials.
    2. Click Administration.
      mceclip0.png
    3. Click Applications and select Applications.
      mceclip1.png
    4. Click Add App.
      mceclip2.png
    5. Type Responsive in the Search box.
      mceclip3.png
    6. Click on Responsive, then click Save.
      mceclip4.png
    7. Click Configuration, then enter the value for RelayState.
      mceclip6.png
      Note: You can get the RelayState value in Responsive at Organization Settings > Security > SSO. If the SAML SSO feature is not visible, contact your Account Manager.
      mceclip7.png
    8. Click Parameters, then scroll down the Required Parameters section and click the field that has a value of No Default.
      mceclip8.png
    9. A pop-up as shown below will be displayed. Select Company from the Value drop-down menu and click Save to update the value.
      mceclip9.png
    10. Scroll down the Optional Parameters section and select the following values:
      mceclip0.png
      • Cost Center field: Select responsive_business_unit (Custom) as the value.
      • Role field: Select responsive_user_role (Custom) as the value.
    11. Click Users from the left navigation pane, click on the user name, and make the required modifications.
      mceclip11.png
    12. Click Save. A success message will be displayed as shown below:
      mceclip12.png
    13. Click Privileges, enter a user name, then click Check.
      mceclip13.png
    14. Click Add Admin.
      mceclip14.png

      The added user will be displayed as shown:

      mceclip15.png
    15. Click Save.
    16. Click More Actions and select SAML Metadata.
      mceclip16.png
    17. Click Leave on the confirmation pop-up to download the metadata file to your computer.
      mceclip17.png

    Configuring OneLogin in Responsive

    1. Go to Organization Settings > Security > SSO and click Add New SSO.
      mceclip0.png
    2. Enter a name.
    3. Select SAML as the SSO Type.
    4. Click Choose File and upload the downloaded metadata file.
    5. Click Validate to validate the uploaded file. A success message will be displayed.
      mceclip1.png
    6. Turn on the OneLogin SAML toggle.
    7. Click Submit. The OneLogin SAML configuration is complete and the user can use SAML for authentication.

    Logging into Responsive Using SAML

    Users can log in to Responsive using SAML in four ways.

    Login from OneLogin Dashboard

    1. From the OneLogin dashboard, click OneLogin.
    2. Click Responsive.
      mceclip18.png

      You will be navigated to the Responsive application page.

      mceclip19.png 

    Login From Responsive Using OneLogin SSO

    1. Enter the URL app.rfpio.com.
    2. Click Continue.
      mceclip0.png

      A page as shown below will be displayed.

      mceclip21.png

    Login Using an Instance-Specific URL

    Contact your account manager to get instance specific URL, which can be bookmarked in your browser.

    Just-in-Time Provisioning

    With Just-in-Time provisioning, you can use a SAML assertion to create regular and portal users on the fly the first time they try to log in. This eliminates the need to create user accounts in advance. For example, if you recently added an employee to your organization and have provided access to Responsive in your SAML Identity Provider, you don't need to manually create the user in Responsive. When they log in with single sign-on for the 1st time, their account is automatically created for them, eliminating the time and effort with on-boarding the account. The new user can be assigned as Admin or Manager or Team Member role by defining the role in the SAML integration. Choose None, It helps in protecting unauthenticated user login through SAML.

    You can also select the default Business Unit for which the SSO login has to be configured (if business unit, a paid add-on has been enabled for your company).
    Note: Multiple SSOs can be created for a single client instance. If interested, raise a support ticket. Once approved the team will enable it for the client.

    mceclip1.png

  • Essentials features are subscription-based and may not be available for all users. Contact your account manager, or accountmanagers@responsive.io, for more details.

    Configuring OneLogin

    1. Login to OneLogin using valid credentials.
    2. Click Administration.
      mceclip0.png
    3. Click Applications and select Applications.
      mceclip1.png
    4. Click Add App.
      mceclip2.png
    5. Type Responsive in the Search box.
      mceclip3.png
    6. Click on Responsive, then click Save.
      mceclip4.png
    7. Click Configuration, then enter the value for RelayState.
      mceclip6.png
      Note: You can get the RelayState value in Responsive at Organization Settings > Security > SSO. If the SAML SSO feature is not visible, contact your Account Manager.
      mceclip7.png
    8. Click Parameters, then scroll down the Required Parameters section and click the field that has a value of No Default.
      mceclip8.png
    9. A pop-up as shown below will be displayed. Select Company from the Value drop-down menu and click Save to update the value.
      mceclip9.png
    10. Scroll down the Optional Parameters section and select the following values:
      mceclip0.png
      • Cost Center field: Select responsive_business_unit (Custom) as the value.
      • Role field: Select responsive_user_role (Custom) as the value.
    11. Click Users from the left navigation pane, click on the user name, and make the required modifications.
      mceclip11.png
    12. Click Save. A success message will be displayed as shown below:
      mceclip12.png
    13. Click Privileges, enter a user name, then click Check.
      mceclip13.png
    14. Click Add Admin.
      mceclip14.png

      The added user will be displayed as shown:

      mceclip15.png
    15. Click Save.
    16. Click More Actions and select SAML Metadata.
      mceclip16.png
    17. Click Leave on the confirmation pop-up to download the metadata file to your computer.
      mceclip17.png

    Configuring OneLogin in Responsive

    1. Go to Organization Settings > Security > SSO and click Add New SSO.
      mceclip0.png
    2. Enter a name.
    3. Select SAML as the SSO Type.
    4. Click Choose File and upload the downloaded metadata file.
    5. Click Validate to validate the uploaded file. A success message will be displayed.
      mceclip1.png
    6. Turn on the OneLogin SAML toggle.
    7. Click Submit. The OneLogin SAML configuration is complete and the user can use SAML for authentication.

    Logging into Responsive Using SAML

    Users can log in to Responsive using SAML in four ways.

    Login from OneLogin Dashboard

    1. From the OneLogin dashboard, click OneLogin.
    2. Click Responsive.
      mceclip18.png

      You will be navigated to the Responsive application page.

      mceclip19.png 

    Login From Responsive Using OneLogin SSO

    1. Enter the URL app.rfpio.com.
    2. Click Continue.
      mceclip0.png

      A page as shown below will be displayed.

      mceclip21.png

    Login Using an Instance-Specific URL

    Contact your account manager to get instance specific URL, which can be bookmarked in your browser.

    Just-in-Time Provisioning

    With Just-in-Time provisioning, you can use a SAML assertion to create regular and portal users on the fly the first time they try to log in. This eliminates the need to create user accounts in advance. For example, if you recently added an employee to your organization and have provided access to Responsive in your SAML Identity Provider, you don't need to manually create the user in Responsive. When they log in with single sign-on for the 1st time, their account is automatically created for them, eliminating the time and effort with on-boarding the account. The new user can be assigned as Admin or Manager or Team Member role by defining the role in the SAML integration. Choose None, It helps in protecting unauthenticated user login through SAML.

    You can also select the default Business Unit for which the SSO login has to be configured (if business unit, a paid add-on has been enabled for your company).
    Note: Multiple SSOs can be created for a single client instance. If interested, raise a support ticket. Once approved the team will enable it for the client.

    mceclip1.png

Was this article helpful?

/