KeyScaler SAML Single Sign-On (SSO) integration
This topic describes how to configure KeyScaler for Single Sign-On (SSO) in CyberArk Identity using SAML.
KeyScaler SSO supported features
This application template supports the following features:
-
IdP-initiated SSO
-
SP-initiated SSO
You can choose one or both methods.
Before you begin
Obtain the following information from the KeyScaler application.
Name | Format |
---|---|
KeyScaler Domain (single sign-on URL) |
https://<organizationName>.keyscaler.com/cp/acs For example: https://cyberark.keyscaler.com/cp/acs |
SP Entity ID |
https://<organizationName>.keyscaler.com/cp/metadata For example: https://cyberark.keyscaler.com/cp/metadata |
Make sure the administrators and users who will use SSO have already been added to KeyScaler and to CyberArk Identity.
Configure the KeyScaler application template in the Identity Administration portal
Step 1: Add the KeyScaler web app template
-
In the Identity Administration portal, select Apps & Widgets > Web Apps, then click Add Web Apps.
-
On the Search page, enter the application name in the Search field and click the search button.
-
Next to the application name, click Add.
-
On the Add Web App page, click Yes to confirm.
-
Click Close to exit the Application Catalog.
The application opens to the Settings page.
Step 2: Configure Trust settings
-
Go to the Trust tab.
-
In the Identity Provider Configuration section, select Manual Configuration. Copy and save the following information for later use:
-
IdP Entity ID
-
SAML Issuer URL
-
Remote Logout URL
-
Signing certificate (download)
-
-
In the Service Provider Configuration section, select Manual Configuration. Enter the following values and click Save after you finish. Obtain these values from the KeyScaler application.
Setting Value SP Entity ID
https://<organizationName>.keyscaler.com/cp/metadata
For example: https://cyberark-trial.keyscaler.com/cp/metadata
Assertion Consumer Service (ACS) URL
https://organizationName.keyscaler.com/cp/acs
For example: https://cyberark-trial.keyscaler.com/cp/acs
NameID Format
emailAddress
Single Logout URL
https://<organizationName>.cp.keyscaler.com/cp/sls
For example: https://cyberark-trial.cp.keyscaler.com/cp/sls
Step 3: Configure SAML Response settings
-
Go to the SAML Response tab.
-
Verify the following attributes with the KeyScaler attribute name in the Attribute Name column and the CyberArk attribute in the Attribute Value column.
Attributes are case-sensitive.
Attribute Name Attribute Value http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress LoginUser.Email -
Map any other attributes that you want to pass in the SAML response, then click Save.
Step 4: Configure permissions to grant KeyScaler users SSO access
Grant SSO access to KeyScaler by assigning permissions to users, groups, or roles.
-
On the Permissions page, click Add.
-
Select the user(s), group(s), or role(s) that you want to grant permissions to, then click Add.
The added object appears on the Permissions page with View, Run, and Automatically Deploy permissions selected by default.
-
Select the permissions you want and click Save.
Default permissions automatically deploy the application to the User Portal if the Show in user app list option is selected on the Settings page. Do not select this option if you intend to use only SP-initiated SSO.
Change the permissions if you want to add additional control or if you prefer not to automatically deploy the application.
Step 5: Review and save.
Review your settings to confirm your configuration. For example, you might want to verify that you selected the appropriate users, groups, or roles on the Permissions page. Click Save when you are satisfied.
Configure KeyScaler for SAML single sign-on
Perform these steps in KeyScaler to configure the KeyScaler app template for SSO.
-
Sign in to KeyScaler as an administrator, then go to <organizationName> > Manage IdP.
-
Copy and paste values from the CyberArk IdP configuration into the following fields.
CyberArk IdP Value
KeyScaler field
IdP Entity ID Login URL Remote Logout URL Loug Out URL SAML Issuer URL Issuer
-
In the Certificate field, upload the signing certificate file that you downloaded from the CyberArk IdP configuration.
-
Click Update.
Test the SSO configuration
Now that you have finished configuring the application template settings in the Identity Administration portal and KeyScaler, KeyScaler users can benefit from IdP-initiated or SP-initiated SSO.
-
Sign in to CyberArk Identity with a user account that exists both the KeyScaler application and CyberArk Identity.
-
Click the KeyScaler application tile to launch KeyScaler in a new tab and automatically sign in.
-
Go to https://<organizationName>.keyscaler.com/cp/
-
Authenticate to the CyberArk IdP.
You are redirected to the KeyScaler application.