Prerequisites
When you use SAML as the SSO mode with provisioning, you need to contact our support team to enable the SSO feature.
SAML Supported features
- IdP-initiated SSO
- SP-initiated SSO (https://YOURINSTANCE.smartersends.com/login)
- Just-In-Time provisioning
For more information on the listed features, visit the Okta Glossary.
SCIM Supported features
- Create users
- Update user attributes
- Deactivate users
- Import users
- Profile sourcing
- Group push
For more information on the listed features, visit the Okta Glossary.
Read this before you enable SAML
Enabling SAML affects all users who use this app. Users won't be able to sign in through their regular sign-in page. They are able to access the app through the Okta service.
Backup URL
SmarterSends doesn't provide a backup sign-in URL where non-admin users can sign in using their regular username and password. If necessary, an administrator can log-in using a backup url, please reach out to support@smartersends.com for instructions on utilizing this feature.
SAML2 Configuration steps
- Search the Okta Integration Network for the application, SmarterSends and add the app to your organization.
- Set your SmarterSends instance base URL in your Okta application e.g. XYZ.smartersends.com
- Click the Sign On tab and then click the Edit for the SAML 2 settings.
- Define the rules for the Groups and Roles settings:
- For the Application Username Format, select Email
- And Click Save.
-
Copy the Metadata URL from the SAML 2.0 Metadata details section in the Okta Admin Console and save this value for the next few steps.
-
Sign in to SmarterSends with an Admin account.
-
Navigate to Integrations.
-
Specify the following:
-
Single Sign-On Provider: SAML2 with SCIM
-
Default Role: Select a role that will be assigned to any user that does not pass a specific role.
- Default Group: Select a group that will be assigned to any user that does not pass a specific group.
- Metadata URL: Copy and paste the metadata URL value from step one.
- Entity ID: Copy and Paste the "Issuer" value from the Okta Admin Console.
-
- Click "Save".
-
The SAML setting is complete in SmarterSends.
SCIM Integration Steps
- Copy the SCIM Base URL from your SmarterSends Integrations page and paste into the "SCIM connector base URL" setting under the Provisioning tab of the SmarterSends application in Okta.
- Copy the SCIM Bearer Token from your SmarterSends Integrations page and paste into the "HTTP Header Authorization" setting under the Provisioning tab of the SmarterSends application in Okta.
- Click "Test Connector Configuration"
Note
- Ensure that you entered the correct value in the "SmarterSends Base URL" field under the General tab. The wrong domain value prevents you from authenticating through SAML to SmarterSends. This value is the base url you use to access your SmarterSends instance e.g. xyz.smartersends.com
- The following SAML attributes are supported:
Name Value Common Name user.firstName + " " + user.lastName Email user.email Phone user.primaryPhone Address user.streetAddress City user.city State user.state Zip Code user.zipCode Country user.countryCode Timezone user.timezone department user.department SSGroups Groups starting with "SSG-" SSRole Group starting with "SSR-"
Comments
0 comments
Article is closed for comments.