This is a premium option. Please contact your Customer Success Manager to enable it on your Kameleoon account.
Single sign-on (SSO) is a method for authenticating users where a single set of credentials can be used to log into several different applications.
When SSO is set up, you can sign in to your third-party IdP, then access Kameleoon app directly without a second sign-in.
Kameleoon lets you implement Single Sign-On (SSO) through the following solutions :
- External identity providers that support the SAML 2.0 standard
- Open ID Connect
- Okta
- Microsoft Azure AD
- France Connect
- SalesForce
Role definition
Our system supports role definition through the use of SAML attributes. There are three distinct roles available: super admin, site admin, and common user. When roles are configured on the identity provider side, they will be automatically mapped to corresponding roles within our system. However, when roles are not configured on the IdP side, our system will rely solely on the internal role definitions.
Microsoft Azure AD
The Single Sign-On (SSO) integration with Microsoft Azure allows for a seamless and secure way for users to access the system. This can be done through two methods: native integration with Azure AD or by using SAML 2.0.
Native integration
To set up the native integration with Azure AD, you will need to provide the tenant ID, client ID, and client secret. Additionally, the callback URL (https://login.kameleoon.com/am/kameleoon/login/callback) needs to be set as an authorized URL on the identity provider’s side.
SAML 2.0
SAML 2.0 can also be used for SSO integration with Microsoft Azure. This method requires the Identity Provider SAML 2.0 metadata XML file to be provided.
Okta
SAML 2.0
SAML 2.0 can be used for SSO integration with Okta.
- Add a new application
- Go to the Okta dashboard.
- Navigate to Applications and click on Create App Integration.
- Select SAML 2.0 as the sign-on method.
- Configure your application
- Enter appropriate details for your application
- In the SAML settings, you’ll need to specify the following:
- Single Sign On URL (this is where Okta will send the SAML response): https://login.kameleoon.com/am/kameleoon/login/callback.
- Select Use this for Recipient and Destination URL checkbox
- Audience URI (SP Entity ID): https://login.kameleoon.com.
- Finish the setup
- After filling out the required fields, save the application.
- Save the metadata URL provided by Okta. We will need it to configure SSO on the Kameleoon side.
Useful links