Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

  1. Make sure you're an admin for SmartAdvocate.

  2. Verify that SmartAdvocate is running using the full domain name on your network and is accessible from the outside (full URL like https://www.samplewebsite.com/SA).

  3. Configure the web.config file by setting the <sustainsys.saml2> section to include the following URIs: 
    return URL and service provider entity ID. 

    1. For example, for our east server, it would be:
      <sustainsys.saml2 entityId="https://east.smartadvocate.com/SA/Saml2" returnUrl="https://east.smartadvocate.com/SA/" />

    2. For other IIS instances, replace “east” with the appropriate subdomain name or use the full
      domain name with the SA location of the server client.

    3. Additionally, in the customer’s tenant Administrator Parameters configuration, their SAML settings should use the same URIs as above. That would be the following parameters:

      image-20241017-125556.pngImage Added

  4. Check that your SmartAdvocate and your identity provider use the HTTPS protocol to communicate and that the configured product base URL is the HTTPS one.

  5. Add an identity provider record to the SmartAdvocate Picklist Maintenance page. Filter the page for Identity, select Identity Providers, and Add New Item.

  6. Please give it a friendly name that will correspond to your IdP name.

  7. Paste the SAML metadata URL, copied before from the IdP into the Entity ID field and Metadata location fields.

  8. Make sure the Load Metadata check box is checked.

  9. Leave everything else empty, and save the record.

    image-20240624-172518.png

...

Return URL. Must have an IDP request parameter

Server clients: https://saserver.com/SA/login.aspx?idp={0}Cloud or tenant clients: https://saserver.com/SA/login.aspx?idp={0}&TenantName=NAMEOFTHETENANT

image-20240624-164536.png

To enforce single sign-on login only:

...