Set up single sign-on (SSO) to the Workbench
Atomic supports Workbench members logging in using either an email and password, or Single sign-on (SSO).
SSO Integration
You can use single sign-on using SAML (such as through Azure AD) to authenticate and authorize Atomic Workbench members.
Workbench members are identified within Atomic by a unique email address, supplied by your authentication provider, as part of the authentication flow.
SAML
To use SAML SSO with Atomic, you'll need to set up a custom SAML application in your authentication provider, which includes the user’s email address in an attribute.
Contact us for the Identifier and Reply URL details.
Once set up, contact Atomic with the following:
- The IdP metadata XML file for the SAML application
- The name of the SAML attribute which contains the user's email. (For example
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress
)- Note: the user's email should be provided in lowercase
Once we have this file, we'll configure our system. Then your users can choose to login with SSO from the Workbench login screen, enter your organization id, and authentication will be delegated to your provider.
Note: a unique email address must be provided as a SAML attribute, so that users can be identified within Atomic. When logging in with SSO for the first time, user details will be merged with any existing Workbench account for the same email address.
Setting up Azure AD
As above, Contact us for the Identifier (Entity ID) and Reply URL (Assertion Consumer Service URL) details.
Then, set up a new enterprise application in Azure:
- Sign in to the Azure portal.
- On the left navigation pane, select the Azure Active Directory service.
- Navigate to Enterprise Applications and then select All Applications.
- To add a new application, select New application.
- Select
Create your own application
. Enter a name for the application, selectIntegrate any other application you don't find in the gallery (Non-gallery)
, and then click Create. - Once the application is created, add Users and groups to the application.
- From the navigation pane, go to Single sign-on and click the SAML tile.
- In the SAML-based sign-on page, find the SAML Signing Certificate section and download the Federation Metadata XML.
- Go to Azure AD > Your application > Single Sign-on > Basic SAML Configuration section > Edit
- Confirm email claims match this url:
- Send the Federation Metadata XML file to Atomic (downloaded in step 8) and let us know if the email claims match (what you checked in step 10). Contact us.
- Atomic will then configure the Atomic side and provide a login url where you can test out the integration.
Automatically authorizing Workbench users with SSO
It is possible to automatically assign Atomic Workbench groups to users who sign in using SSO.
To do so Atomic requires you to provide an additional attribute in the SAML payload that your application sends to Atomic. Within this attribute you set a piece of metadata which you can then map in the Atomic workbench to the relevant Atomic Workbench groups. You must supply Atomic with the name of the attribute which contains the metadata to map.
After providing Atomic with the name of your metadata attribute, configure your SSO mapping settings in the Atomic Workbench. Open Organization settings from the sidebar menu by clicking the Organization icon and choosing Organization.
From the Organization settings, choose "Single sign-on". Here you will see settings for your configured SSO client. You can now add a mapping. Select "Add mapping" and enter the piece of metadata that maps to a given Atomic group(s) and then select the group(s) which should be granted to users when they have that metadata present.
Setting up automatic authorization in Azure based on AD groups
In Azure from the "SAML-based Sign-on" menu, find your Atomic SSO client. Select "add a new group claim" and choose the "Group Id" as the value. This will Add a new attribute to your SAML payload that is sent to Atomic. This attribute will be under the name "http://schemas.microsoft.com/ws/2008/06/identity/claims/groups" and contain the ID of the group that is assigned to your AD user. Over in Atomic you can then use this group Id to map an AD group to an Atomic Workbench group.