Configure single sign-on using OAuth 2.0 or SAML 2.0

Double-check your SSO configuration before you click Save on the SSO settings page. When you click Save, Make enables SSO with the settings you provided. and logs you out immediately. You cannot log in with your credentials anymore.

  1. Log in to your Make White Label instance.

  2. Go to Administration > System settings.

  3. Select an SSO type.

    1. None - default option indicating that SSO is turned off.

    2. OAuth 2.0

      1. Select this option for OpenID Connect (OIDC).

    3. SAML

  4. Fill in the protocol-specific information as described in the tables following this procedure.

  5. Enter an IML resolve. The IML resolve maps necessary data such as ID, name, and email, between Make and your identity provider.

  6. Under SSO Options, define whether and how your instance assigns new users to organizations. You can choose from the following options:

    • Don't create a new organization.

      • This option only creates a new user. That new user has no access to the scenario editor or other features. You must manually add the new user to an organization.

    • Create a new organization and team.

      • This option is similar to what happens to Make users on the public cloud. They receive their own organization and can create scenarios as they like.

    • Assign to an existing organization and team.

      • This option requires entering the organization ID number and team ID number. An example use case is users within the same company. Each new user joins the organization and can only access their assigned organization and team.

  7. Click Save.

Make enables SSO with the settings you provided and logs you out immediately. You can now log in with your SSO provider credentials. At the same time, you receive an email with a one-time link, which you can click to disable SSO. Use the one-time link within 24 hours before it expires. After 24 hours you must contact your customer success specialist.

Open ID Connect (OAuth 2.0 settings)

The following fields appear once you select OAuth 2.0 from the SSO menu:

Field
Required
Description

User Information URL

Yes

URL obtained from your identity provider.

Example: https://example.com/oauth2/v1/userinfo

Client ID

Yes

Obtained from your identity provider. Sometimes called Application ID.

Token URL

Yes

required

URL obtained from your identity provider.

Example: https://example.com/oauth2/v1/token

Login scopes

optional

Parameters used when accessing your identity provider.

Scopes separator

optional

The character used between scopes, such as a space or a comma. If your separator is a space, use the spacebar on your keyboard.

Authorize URL

Yes

URL obtained from your identity provider.

Example: https://example.com/oauth2/v1/authorize

Client secret

Yes

Obtained from your identity provider.

IML resolve

Yes

Because both Make and your Identity provider use attributes such as username and email, you need to map these attributes using IML.

For Open ID Connect:

{"id":"{{sub}}","email":"{{email}}","name":"{{name}}"}

Redirect URL

optional

The location where the identity provider sends the user once successfully authorized and granted access. Must be unique to your application/instance.

SAML 2.0 settings

Field
Required
Description

Service provider primary key

Yes

The private key used to sign requests. You can get this from your certificate authority or create your primary key using OpenSSL. Make can extract this from the following file formats:

  • P12

  • PFX

  • PEM

Service provider certificate

Yes

An x.509 certificate you create. Make can extract this from the following file formats:

  • P12

  • PFX

  • PEM

Identity provider certificate

Yes

An x.509 certificate created and stored by your IdP, for example, Google, Okta, or Microsoft Azure Directory. You can enter this information in the following ways:

  • Copy and paste from your IdP's UI.

  • Copy and paste from your IdP's metadata XML file.

  • Extract from any of the following:

    • P12

    • PFX

    • PEM

IdP login URL

Yes

Also called an authorization URL. The IdP login URL is available from your IdP, for example, Google, or Okta. The IdP metadata typically contains this information in XML. The IdP metadata is usually downloadable from your Identity provider.

IdP logout URL

Yes

A URL created by your IdP to enable Single Log Out (SLO). Leave this field empty to disable SLO.

Login IML resolve

Yes

Because both Make and your Identity provider use attributes such as username and email, you need to map these attributes using IML.

Redirect URL

Optional

The location where the identity provider sends the user once successfully authorized and granted access. Must be unique to your application/instance.

Allow unencrypted assertions

Optional

Your IdP may not support SAML 2.0 assertions with encryption. Check with your IdP to determine whether you need to enable this option.

Allow unsigned responses

Optional

Your IdP may not support a signed SAML 2.0 response. Check with your IdP to determine whether you need to enable this option.

Sign requests

Optional

Your IdP may require a signed SAML 2.0 response. Check with your IdP to determine whether you need to enable this option.

Audience

Optional

Optional field to define the intended target. Typically this is a URL but can also be formatted as any string of data.

Create your service provider primary key and certificate

Your Make White Label instance signs and verifies SAML 2.0 requests with the primary key and certificate that you provide.

Use openssl or similar as in the following example:

openssl req -newkey rsa:2048 -new -nodes -x509 -keyout key.pem -out cert.pem

This example creates two separate files that you can extract into the following fields:

  • Service provider primary key

  • Service provider certificate

Create URLs for your instance as a service provider

To configure SSO on your identity provider, you need to provide URLs. The following are examples using the base domain https://example.celonis.integromat.

Adjust them according to the domain of your instance.

  • SAML ACS URL: https://example.celonis.integromat.com/sso/saml

  • SAML Entity Information URL (also known as Audience Restriction URL): https://example.celonis.integromat.com/sso/saml

Create and enter Login IML resolve

To support a broad choice of identity providers (IdPs), Make lets you map values related to identifying users. The IML resolve maps the values from your IdP to Make's internal values by using IML, a JavaScript-based function notation. Your IML resolve must be specific to your IdP. You must map the following properties:

Field
Description

email

You can map this to any valid email.

Note: Aliases and alternate email suffixes can create problems. Be sure to map the most appropriate email in your IML resolve.

name

Used as the user's name in the application.

You can reuse email for this property.

If left blank creates a user without a name that must be updated later.

id

External user ID

Can be an integer or string but must be mapped to an identifier.

Example

In the following example, the resolve maps the following values:

{
"email":"{{get(user.attributes.email, 1)}}",
"name":"{{get(user.attributes.firstName, 1)}} {{get(user.attributes.last}}
"id":"{{user.name_id}}"
}

Last updated