After retrieving the IdP metadata, create a SAML app in the Command Center using the IdP metadata file that you saved.
Before You Begin
If you need to create a SAML app for a specific company, in the upper-right corner of the page, from the Select a company list, select the company that you want to create the SAML app for.
Log on to the Command Center.
From the navigation pane, go to Manage > Security.
The Security page appears.
Click the Identity servers tile.
The Identity servers page appears.
In the upper-right corner of the page, click Add > SAML.
The Add SAML app page appears.
On the General tab, in the Name box, enter the domain name that you want to associate users with.
The SAML application is created using the domain name.
For SAML user groups mapping to function correctly, the name that you enter here must be the same as your Metallic Tenant Name.
On the Identity provider metadata tab, in the Upload IDP metadata box, browse to the XML file that contains the IdP metadata, and then click Open.
The Entity ID and the Redirect URL from the file are displayed.
On the Service provider metadata tab, review the value in the Service provider endpoint box.
This value is automatically generated and is used in the SP metadata file. The format of the value is https://mycompany:443/webconsole.
To digitally sign the SAML message, move the Auto generate key for digital signing of SAML messages toggle key to the right.
On the Associations tab, identify the users who can log on using SAML:
To identify users by their email addresses, in the Email suffixes box enter an email suffix, and then click Add.
Note: You must use an email suffix as specified in the SAML integration settings to avoid integration issues.
If you face SAML integration issues, use a break glass account. The break glass account must be on different domain than that of the current domain.
To identify users by the companies they are associated with, from the Companies list, select a company, and then click Add.
To identify users by the domains they are associated with, from the Domains list, select a domain, and then click Add.
To identify users by the user groups they are in, from the User groups list, select a user group, and then click Add.
If you migrate from an Exchange On-premises server to an Exchange Online server, you must add the appropriate domain and user group.
You can add any combination of associations, and you can add multiple associations in each category.
The Connectivity Test screen appears.
To add the SAML app in the IdP and test the connection:
Note: Alternatively, skip this step and click Finish. You can add the SAML app in the IdP and test the connection on the SAML app page in the General section.
On the Connectivity Test screen copy the (Single Sign-On) SSO URL or download the SP metadata.
In a separate browser window:
Using the SSO URL and the SP metadata, create a SAML app in the IdP website.
In the SAML app that is created in the IdP, update the SSO URL or upload the SP metadata.
Note: Some IdPs such as OKTA require you to update the SSO URL, while other IdPs such as Azure require you to upload the SP metadata.
Sign out of any existing IdP sessions in your browser window.
On the Connectivity Test screen:
Click Test login.
A browser window appears.
Enter the email and password for a user to test the SAML login.
Close the browser window.
After the test login is successful, the SAML app will be enabled in the Command Center.
The SAML app screen appears.
On the General tab, in the General section, next to the NameID attribute, click the Edit button .
From the NameID attribute list, based on the attributes in the IdP response, select either Email or User Principal Name.
After the SP (service provider) metadata is downloaded, place the SP metadata on the Active Directory Federated Service (AD FS) machine.