Views:

Security Assertion Markup Language (SAML) is an open authentication standard that allows for the secure exchange of user identity information from one party to another. SAML supports single sign-on (SSO), a technology that allows for a single user login to work across multiple applications and services. When you configure SAML settings in Deep Discovery Director (Internal Network Analytics Version), users signing in to your organization's portal can seamlessly sign in to Deep Discovery Director (Internal Network Analytics Version) without an existing Deep Discovery Director (Internal Network Analytics Version) account.

In SAML single sign-on, a trust relationship is established between the identity provider (IdP) and the service provider (SP) by using SAML metadata files. The identity provider contains the user identity information stored on a directory server. The service provider (which in this case is Deep Discovery Director (Internal Network Analytics Version)) uses the user identity information from the identity provider for user authentication and authorization.

Deep Discovery Director (Internal Network Analytics Version) supports the following identity providers for single sign-on:

  • Microsoft Active Directory Federation Services (AD FS) 4.0 or 5.0

  • Okta

To connect Deep Discovery Director (Internal Network Analytics Version) to your organization environment for single-sign-on, complete the following:

  1. Access the Deep Discovery Director (Internal Network Analytics Version) management console to obtain the service provider metadata file.

    You can also update the certificate in Deep Discovery Director (Internal Network Analytics Version).

  2. In your identity provider:

    1. Configure the required settings for single sign-on.

    2. Obtain the metadata file.

    For more information, see the documentation that comes with your identity provider.

  3. In Deep Discovery Director (Internal Network Analytics Version):

    1. Import the metadata file for your identity provider.

    2. Create SAML user groups.