You are here

Managing SAML SSO

If you're a network administrator you can configure Security Assertion Markup Language (SAML) in SkyVault so that SkyVault can be included in your Single Sign-On (SSO) network.

SkyVault uses SAML (2.0) to set up an SSO. SAML standards define an XML-based framework for describing and exchanging security information between identity providers (IdPs) and service providers (SP).

This security information is expressed in the form of portable SAML assertions that applications working across security domain boundaries can trust. SAML is based on a trust relationship between an IdP and an SP (in this case SkyVault) who agree to share authentication information; metadata, and configuration information that is required to access services.

See the OASIS SAML V2.0 website for more information on SAML specifications.

SkyVault uses Web Browser SSO and Single-Logout (SLO) profiles. Once the network administrator configures SAML, all users for a given network can access SkyVault.

To set up SSO for SkyVault, the identity provider (for example, PingFederate) and the service provider (SkyVault Share) need to be configured.

The diagram below explains the exchange of information between SkyVault and an IdP.

Note: SkyVault only supports HTTP POST binding; other bindings, such as HTTP redirect. HTTP artifact and SOAP are not supported.