SSO is available as a paid Add-on for any CloudControl device plan or Enterprise DevSpace plan.
SSO is currently NOT available for White-label instances of signageOS Box.
signageOS supports the vast majority of SSO options using the Okta/Auth0 service.
Enterprise Connections like to authenticate users in an external, federated identity provider (IdP) such as Okta Workforce, Microsoft Azure AD, and more. Alternatively, configure a custom SAML or OpenID Connect connection for even more versatility.
SSO service is always enabled on the Company level, allowing you to define:
- SSO protocol
- Company-owned domains
- Default user's roles
A list of all supported SSO options can be found on the Auth0 website: https://marketplace.auth0.com/features/sso-integrations
Configuring Single Sign-On (SSO): Identity provider (IdP) setup guide
1. Information to send us (before setup)
| Required from you | Purpose | Example |
|---|---|---|
| Proposed connection name | A unique, clear name for this SSO connection (e.g., Your Company Name, plus the IdP used) | Acme-Corp-Azure-AD |
2. Information we send you (For your configuration)
| Provided by us | Your IdP field name | Example |
|---|---|---|
| Assertion Consumer Service (ACS) URL | Reply URL / Single Sign-On URL | Signageosauth0.amy.dev.signageos.io/login/callback?connection=Acme-Corp-Azure-AD |
| Entity ID | Audience URI / SP Entity ID | urn:auth0:sos-amy:Acme-Corp-Azure-AD |
3. Mandatory configuration on your Identity provider (IdP)
Configure the connection details
- Create New Application: Start by creating a new SAML 2.0 application/connection within your IdP (e.g., "Add Gallery App")
- Input our Details: Enter the following values in the corresponding fields:
- ACS URL (Reply URL): Paste the ACS URL we provided
- Entity ID (Audience URI): Paste the Entity ID we provided
- Optional Fields:
- Start URL / Single Sign-On URL: This field is usually left blank for an SP-initiated flow
Configure user attribute mapping
- Locate Attributes/Claims: Navigate to the Attributes, Claims, or User Mapping section of your IdP setup
- Define Email Attribute: Configure a claim that maps the user's profile email address to a specific attribute name
- Goal: The value sent must be the user's unique email address
-
Example: Map the user's email address to an attribute named
EmailAddress
4. Final Information to send back to us
We will confirm receipt of these details, complete our final setup, and then coordinate a test login with you.
| Required by us | Description | Source on your IdP |
|---|---|---|
| 1. Sign In URL (SSO URL) | The specific URL your IdP generates for initiating the Single Sign-On process | Often labeled SSO URL, IdP Login URL, or SAML Endpoint |
| 2. X.509 Signing Certificate | Your IdP's public signing certificate. This is used to verify the integrity of the SAML message | Often provided as a downloadable .cer, .pem, or .txt file, or as a string of text |