Fivetran SAML Single Sign-On (SSO)
You can configure the Fivetran application for IdP-initiated SAML SSO access through CyberArk Identity User Portal. Fivetran is an application that is used to centralize and manage data from disparate sources.
AppName SAML SSO supported features
Fivetran supports IdP-initiated SSO.
Prerequisites for Fivetran SSO
Before you begin, confirm the following:
You have an active Fivetran account with administrator rights for your organization.
Fivetran users who will access CyberArk Identity User Portal through SSO have already been added to CyberArk Identity.
Configure the Fivetran app template in the Identity Administration portal
Perform these steps to configure IdP-initiated SSO for Fivetran.
Step 1: Add the Fivetran web app template.
In the Identity Administration portal, select Apps > Web Apps, then click Add Web App.
The Add Web Apps screen appears.
On the Search tab, enter Fivetran in the Search field and click the Search button.
Next to Fivetran, click Add.
In the Add Web App screen, click Yes to confirm.
Click Close to exit the Application Catalog.
The Fivetran application opens to the Settings page.
Step 2: Configure the Settings page.
- Set an app name, description, and logo if you want to change them.<![CDATA[ ]]>
Fivetran is added to the CyberArk App Catalog.
Step 3: Configure the Trust page.
In the left-hand menu, select Trust.
In the Service Provider Configuration section, select Manual Configuration. Confirm that your page contains the following pre-configured SAML settings. Click Save after you finish.
Step 4: Configure the SAML Response page.
In the left-hand menu, select SAML Response.
Click Add and add these attributes: Email, FirstName, LastName. Attributes are case-sensitive.
Step 5: Configure the Permissions page to grant Fivetran users SSO access.
Grant SSO access to Fivetran by assigning permissions to users, groups, or roles.
On the Permissions page, click Add.
The Select User, Group, or Role window appears.
Select the user(s), group(s), or role(s) that you want to give permissions to, then click Add.
The added object appears on the Permissions page with View, Run, and Automatically Deploy permissions selected by default.
Select the permissions you want, then click Save.
Default permissions automatically deploy the application to the User Portal if the Show in user app list option is selected on the Settings page. Change the permissions if you want to add additional control or you prefer not to automatically deploy the application.
Step 6: Review and save.
Review your settings to confirm your configuration. For example, you might want to verify that you selected the appropriate users, groups, or roles on the Permissions page. Click Save when you are satisfied.
Configure Fivetran for SAML single sign-on
This procedure describes the steps in Fivetran needed to configure the Fivetran app template for SSO.
You need to copy metadata from CyberArk Identity (identity provider) to the Fivetran application (service provider). In the Identity Administration portal, select Trust, then Manual Configuration. In the Identity Provider Configuration section, copy the values for the IdP Issuer, Signing Certificate, and SAML Issuer URL fields.
Sign in to the Fivetran application as an administrator.
Click Manage Accounts > Accounts > Settings.
Paste the values you just copied from the IdP to their corresponding fields as shown in the table.
From Identity Administration portal
To the Fivetran Application
SAML Issuer URL
Sign on URL
IdP-initiated SSO is now configured to work with Fivetran.
Test the Fivetran SSO configuration
Test Fivetran SAML SSO for one user.
In the Identity Administration portal, click Apps & Widgets > Web Apps to go to the Fivetran template. In the left-hand menu, select Permissions.
Click Add, then select the user to whom you are granting permissions.
Sign in to the CyberArk User Portal with the user's account credentials.
Click the Fivetran application tile to launch Fivetran in a new tab and automatically sign in.
The Fivetran Welcome Dashboard page appears after successful SSO.
See the Fivetran documentation for additional resources: Single Sign-On - Fivetran Support Portal.