Skip to main content

Single Sign On (SSO) and SAML Integration

If you are on the Enterprise plan, you can connect Paligo to a Single Sign On (SSO) service. The benefits of this type of setup include:

  • Reduced administration time

    Manage all of your software-as-a-service (SaaS) user accounts, not just Paligo user accounts, from a single SSO service. This is especially useful in larger organizations where the workforce regularly changes due to people joining, moving departments, leaving and retiring.

  • Easier access

    Users can log in to different applications without entering their username and password each time.

  • Security

    SSO user accounts are centralized, so you can apply security measures, such as password strength, to all users.

To set up Paligo to work with your SSO service:

  1. Learn the basics of how SSO works [optional].

  2. Set up your SSO service to connect to Paligo.

    We have some general instructions that apply for many SSO services.

    If you are using Okta, Azure, or JumpCloud, those SSO services need to be set up in a different way. We have included instructions for those special cases:

  3. Connect Paligo to your SSO Service.

Important

If you set up Paligo to use an SSO service, the SSO takes priority over Paligo's built-in two-factor authentication (2FA).

When your SSO service is set up to connect to Paligo, the sign-in process for users is:

Single Sign On concept. User logs in to Paligo. Paligo contacts SSO service. SSO service approves or denies the user's sign in.
  1. User opens Paligo in a browser and selects a Sign in button. They do not need to enter a user name or password.

  2. Paligo redirects to the SSO service for the user's sign-in details.

    The SSO service needs to be able to authenticate the user's account, password, and user group.

  3. The SSO service responds to Paligo:

    If the user is signed-in to the SSO service already, the SSO service should sign the user into Paligo too. It will provide Paligo with the user's username, password, and user group.

    If the user is not signed-in to the SSO service, Paligo redirects them to the SSO service sign-in. When they sign in to the SSO service, they will also be automatically signed in to Paligo.

You can use the SSO service to manage your user accounts and you can add user accounts too. The settings you apply there will apply to the user accounts for all of the applications that are set up to use SSO, including Paligo.

When using an SSO service to manage user accounts, be aware that:

  • You cannot use an SSO service to delete a Paligo user account. You will need to do that manually in Paligo.

  • If you use an SSO service to add a new user to a Paligo user group, Paligo will create that user account when the user attempts to sign in.

To use an SSO service with Paligo, the service has to be configured to communicate using Security Assertion Markup Language (SAML). Usually, this configuration work is performed by IT specialists who have an in-depth understanding of the SSO service.

To help you set up your SSO service to work with Paligo, we have:

  • General instructions (see procedure below).

    These cover the main principles and most SSO services require similar information.

  • Separate instructions for the following SSO services, which are special cases and need different configuration:

In your SSO provider:

  1. Create one user account for each Paligo user account.

  2. Create a custom SAML 2.0 application.

  3. Configure the SAML 2.0 application. The terminology used for the settings can vary, but you will need to:

    1. Set the Assertion Consumer Service (ACS) URL for Paligo, the endpoint where the SSO service provider connects to Paligo.

      Use this URL: https://your.paligoapp.com/saml/acs. Replace your with the domain name of your Paligo instance, for example: https://acme.paligoapp.com/saml/acs

    2. Set the Service Provider (SP) URL for Paligo.

      Use this URL: https://your.paligoapp.com/saml/metadata. Replace your.paligoapp.com with the domain name of your Paligo instance.

    3. Set the application user name or ID to: email

    4. Create attribute mapping for Paligo's user credentials:

      • user.firstname

      • user.lastname

      • user.email

      Note

      There may be additional settings required, depending on your SSO Service.

    5. Map them to the equivalent attributes in your SSO service. Refer to your SSO service documentation for information on those.

  4. Create a group attribute for Paligo. Depending on the SSO service you are using, this should have the name / value paligo.usergroup or paligo_usergroup.

  5. Export the SSO service's metadata file so that you can import it into Paligo.

  6. Create a user group for each Paligo user group. This step is required in some SSO services, whereas with others, you can add the user group name to the user settings.

    In Paligo, every user account belongs to a user group, such as administrators, authors, contributors, reviewers, publishers, it admins or translation managers. When users log in to Paligo using SSO, Paligo needs the SSO service to provide the user group information (as well as the first name, last name and email). User groups are not included in the default metadata, so you need to add them in your SSO service.

  7. Associate each user account with the appropriate user group.

  8. Associate each user group with the SAML 2.0 application that you have created to represent Paligo.

  9. In Paligo, use the SSO integration settings to Connect Paligo to your SSO Service.

Before you connect Paligo to your SSO service, make sure you have set up your SSO service. It needs to be able to provide user authentication data to Paligo. As part of the setup, you will export a metadata file that you will be able to import into Paligo.

When the SSO service is set up, you can connect Paligo to it:

  1. Log in to Paligo via a user account that has administrator permissions.

  2. Sign in to Paligo using a user account that has administrator permissions.

  3. Select the avatar in the top-right corner. User avatar. It shows the user's image and their name. Next to the name is a downward pointing arrow, which when selected, reveals a menu.

  4. Select Settings from the menu. Cog icon.

  5. Select the Integrations tab. Jigsaw piece icon.

    Paligo settings. The Integrations tab is highlighted.
  6. Select Add in the SAML 2.0 section to expand the connection settings.

    SAML-section.jpg
  7. Enter the Provider Name, a display name for the SSO service, for example, Okta or JumpCloud.

    Connect_To_SSO_small.jpg
  8. Select Upload metadata file and select the metadata file that you exported from the SSO service when it was set up.

  9. In most cases, you should be able to ignore the Advanced Settings section. These settings are filled automatically, as the values come from the SAML XML file you uploaded in the previous step. If, for some reason, the settings need to be added or changed, you can make the changes manually.

    Advanced settings for single sign on include entity id, ssl certificate, single sign on service url and single sign out service url.
    • Entity ID - The identifier for your SAML endpoint. This is sometimes called the identity provider issuer.

    • SSL Certificate - The secure socket layer (SSL) certificate for the SSO service.

    • Single Signon Service URL - The address of the single sign-on service.

    • Single Signout Service URL - The address of the single sign-out service, if used. When this is used, logging out of Paligo logs the user out of the SSO service as well, not just Paligo. This is empty if the feature is not used.

  10. Check the Enable sign-in alternative checkbox so that users can sign in to Paligo manually as well with SSO. This is important the first time you set up SSO, as if there is an error, you will need to be able to log in to Paligo without SSO to fix it.

    Enable sign-in alternative checkbox is selected. This means users can still log in without SSO if needed.
  11. Check the Force authentication to set the forceAuthn parameter to true in the request to the identity provider. This will require the user to authenticate themselves even if there is an active session with the IdP.

    Force_Authentication_SSO_small.jpg
  12. Check the Enable SSO box to activate single-sign in.

    SAML 2.0 integration settings, Enable SSO checkbox is checked.

    Note

    If you want to store the settings without activating SSO, clear this checkbox. You can return to this page and enable SSO later if needed.

  13. Select Save.

  14. Log out of Paligo.

    Caution

    Do not log out of Paligo if the Enable sign-in alternative setting is not checked and you have not yet tested SSO. Logging out could result in you being unable to log in to Paligo.

  15. Log back in again. You should now see an SSO sign in option that, when selected, logs you into Paligo.

    Note

    If you do not see the SSO sign in option or if the SSO sign-in attempt is unsuccessful, log in with your username and password and check that you have completed the steps described in this topic correctly.

    Usually, failed SSO sign-ins are due to incorrect configuration in the SSO service. Please make sure that you have entered the correct URLs and have set the correct attributes for firstname, lastname and email.

    The most common error is that the user group is incorrectly set up in the SSO service. The SSO service has to be able to provide Paligo with the username, email, and usergroup metadata. For more information on the SSO service settings, see Connect an SSO Service to Paligo.

  16. Once SSO works as expected, enter the SAML 2.0 settings.

  17. Clear the checkbox for Enable sign-in alternative.

    If this option is disabled the users can no longer use username and password to login. They have to use SSO to log in.

  18. Select Save.

To set up Azure SSO to connect with Paligo:

  1. Create an enterprise app registration for Paligo. For instructions, see the official Microsoft documentation at Quickstart: Add an enterprise application.

  2. Find the SSO settings in Enterprise Applications.

  3. Select the app you registered and then Single sign-on.

  4. Enter the Basic SAML configuration. You need to provide the following details and replace instancename with the name of your Paligo instance, for example, https://acme.paligoapp.com.

    • Identifier

      https://instancename.paligoapp.com/saml/metadata

    • Reply URL

      https://instancename.paligoapp.com/saml/acs

    • Sign On URL

      https://instancename.paligoapp.com/saml/login

    • Relay State and Logout URL

      https://instancename.paligoapp.com

  5. Select Edit next to Attributes and Claims.

  6. Select Add a new claim and then enter the details for the new claim. For Paligo, you will need to create 5 claims, so you will repeat this step. We have included the name and source attribute details for each claim below.

    Name

    Source attribute

    user.email

    user.mail

    user.firstname

    user.givenname

    user.lastname

    user.surname

    paligo.usergroup

    user.assignedroles

    Unique User Identifier

    user.mail

    Note

    Each claim should be a regular claim, not a group claim. This applies to all of the claims for Paligo, including the paligo.usergroup claim.

  7. Repeat the previous step until you have added all 5 of the required claims and their appropriate source attributes.

  8. Create the App roles for each Paligo user group.

    1. Go to Microsoft Entra ID.

    2. Select App registrations.

    3. Select Paligo (or whatever you named the app during registration).

    4. Select App roles.

    5. Select Create app role.

    6. Enter the details for the app role. For Paligo, you will need to create several app roles and so you will repeat this process. We have included the details for each app row below.

      Display name*

      Description*

      Allowed member types

      Value

      Enable app role?

      Admin

      Paligo admin

      Users/Groups

      paligo.admin

      Yes (check box)

      Contributor

      Paligo contributor

      Users/Groups

      paligo.contributor

      Yes (check box)

      User

      Paligo user

      Users/Groups

      paligo.user

      Yes (check box)

      Reviewer

      Paligo reviewer

      Users/Groups

      paligo.reviewer

      Yes (check box)

      * The Display name and Description can be anything, the entries we have provided are just suggestions. But note that the Allowed member types and Value have to match exactly what is shown above and all of the app roles have to be enabled.

      Edit_App_Role_PaligoAdmin_small.png
    7. Repeat the previous two steps until you have created all of the required app roles.

  9. Return to your Paligo Enterprise application settings and select Users and groups. Here, you are going to add the Azure users that you created in the Microsoft Entry ID directory.

  10. Create the users:

    1. Select ✚ Add user/group and choose a user.

    2. Assign the appropriate User role to the user. The user roles are those that you created in the App roles earlier).

    3. Repeat these steps until you have created all of the users and assigned the appropriate user roles.

  11. Return to your Paligo enterprise application settings. In the Single sign-on settings, create a certificate.

  12. Download the Federation metadata XML.

  13. Sign in to Paligo using a user account that has administrator permissions.

  14. Select the avatar in the top-right corner. User avatar. It shows the user's image and their name. Next to the name is a downward pointing arrow, which when selected, reveals a menu.

  15. Select Settings from the menu. Cog icon.

  16. Select the Integrations tab. Jigsaw piece icon.

    Paligo settings. The Integrations tab is highlighted.
  17. Select Add or Change in the SAML SSO panel.

    SAML SSO integration panel. It has either an Add option or a Change option.
  18. Use Upload metadata file to upload the Federation metadata XML file from Azure.

    Note

    If the validation fails, try to upload the Federation metadata XML file again, only this time clear the Validate the document checkbox on the upload dialog.

    Setup wizard for Single Sign-on dialog. It has a field for uploading a metadata file and a Validate the document checkbox. The checkbox is highlighted and the box is unchecked.
  19. After your metadata uploads, expand the Advanced settings and delete the Single Signout Service URL. It is important that this field is empty.

    Advanced settings section of the SAML SSO integration settings. The Advanced Settings drop down is highlighted. The Single Signout Service URL setting is also highlighted and it has a clear field as its value has been deleted.
  20. Make sure that Enable sign-in alternative is checked for first-time testing of the SSO sign-in.

  21. Check the Enable SSO box.

  22. Select Save.

Your Azure service should now be connected to Paligo. Try signing in using SSO.

If you are able to sign in using SSO, go back to the SAML SSO panel and clear the Enable sign-in alternative box.

If you are unable to sign in using SSO, go back through the steps above and make sure you have followed the instructions carefully. Look out for typing mistakes and copy and paste mistakes, as they are often the cause of problems. If you continue to have problems signing in, please contact customer support.

Note

When you have set up SSO, all user management is done in the SSO service, in this case, Azure. This includes changing license types and passwords and adding and removing users. You cannot manage users in Paligo when SSO is being used.

You can connect Paligo to Okta for single sign on (SSO). This is only available on the Enterprise plan.

To use Okta with Paligo, you need to set up Okta to provide metadata to Paligo. The metadata includes the name of the user, the user's email address, and the user group that the user belongs to.

Note

The metadata describing the user group is not part of the standard metadata. You must add this metadata to the SAML response.

To be able to Connect Paligo to your SSO Service you need to set up Okta to integrate with Paligo.

Note

For this section, we assume that you have already created your user accounts in Okta.

Create a New Application Connector for Paligo in Okta

The first stage of setting up Okta to communicate with Paligo is to create a new application connector.

In Okta:

  1. Locate your applications and select Add application and then Create New App.

  2. Apply the following settings for your new application:

    • Platform - set to Web

    • Sign on method - set to SAML 2.0

    Okta create a new application integration screen. Select Web and SAML 2.0
  3. Select Create.

  4. In the General settings, enter Paligo as the App name and then select Next.

  5. Define the SAML settings.

    In the General section, enter the following (replace my.paligoapp.com with your Paligo instance name, for example: acme.paligoapp.com).

    Setting

    Value

    Single sign on URL

    https://my.paligoapp.com/saml/acs

    Audience URL

    https://my.paligoapp.com/saml/metadata

    Default RelayState

    https://my.paligoapp.com

    Application username

    Choose email

  6. In the Attribute statements section, add the following attributes:

    Name

    Name format

    Value

    user.firstname

    Basic

    user.firstName

    user.lastname

    Basic

    user.lastName

    user.email

    Basic

    user.email

    paligo.usergroup

    Basic

    appuser.paligo_usergroup

    Your settings should look like this:

    SAML Settings in Okta. The settings show the values that are needed for connecting to Paligo.
  7. Double-check that your attribute statements are exactly as described in the previous step. Look out for typing mistakes as any errors may prevent the connector from working.

  8. Select Next.

The next stage in Okta is to Add the User Group to the Okta SAML Response.

Add the User Group to the Okta SAML Response

You need to add the Paligo user group information to the Okta SMLA assertion details. This is because the user group is required for user's signing in to Paligo, but it is not included in the default Okta metadata.

In Okta:

  1. Select Directory and then Profile Editor.

  2. Select the Profile button for the Paligo app.

  3. Select Add attribute and enter the details for the Paligo user group.

    Okta Add attribute interface showing the settings for the paligo user group

    Setting

    Value

    Display name

    Paligo user group

    Variable name

    paligo_usergroup

    Description

    Optional. You can leave this blank or add a description to explain the purpose of the user group attribute.

    Data type

    string

    Attribute length

    Between. You do not need to define a min and max value, leave those fields empty.

    Attribute required

    Check Yes.

    Scope

    Check the User personal box if you want to assign the user group attribute (for Paligo) to user accounts individually.

    If you clear the User personal box, the user group attribute (for Paligo) will apply to all user accounts in the Okta user group. Please refer to Okta documentation for more information.

  4. Check that you have entered the correct details for the Paligo user group. Look out for typing mistakes as they could prevent the login from working as expected.

  5. Save the attribute.

Next: Assign the Users to Paligo .

Assign the Users to Paligo

Assign both of the following to each user that is going to use Okta to sign in to Paligo:

  • Paligo application

  • Paligo user group

In Okta:

  1. Select Directory and then People.

  2. Select a user account.

  3. On the Applications tab, select Assign Applications.

  4. Select Assign for the Paligo application.

  5. In the Paligo user group field, enter the appropriate syntax for the user's role in Paligo. The following table shows the possible values you can use:

  6. Save the user.

  7. Repeat this process for each user account that is going to have access to Paligo via Okta.

  8. Check your users to make sure that you have entered the correct syntax. Look out for typing mistakes as any errors could prevent the logins from working.

Get the Metadata from Okta

Set Okta to get the metadata file that is needed for the connection:.

In Okta:

  1. Select Applications and then Applications.

  2. Select Sign On.

  3. Right-click on the Identity Provider Metadata link and choose to save the link as a file. Give the file a name and an .xml extension, for example, metadata.xml. You will need this XML when you set up the Paligo connection.

You have now completed the configuration that is needed in Okta. The next step is to Connect Paligo to your SSO Service.

You can connect Paligo to JumpCloud (https://www.jumpcloud.com) for single sign on (SSO). This is only available on the Enterprise plan.

To use JumpCloud with Paligo, you need to set up JumpCloud to provide metadata to Paligo. The metadata includes the name of the user, the user's email address, and the user group that the user belongs to. The metadata describing the user group is not part of standard metadata. You must add this metadata to the SAML response.

Note

For this section, we assume that you have already created your user accounts in JumpCloud.

To be able to Connect Paligo to your SSO Service you need to set up JumpCloud to integrate with Paligo.

The first stage of setting up JumpCloud to communicate with Paligo is to create a new application connector.

In JumpCloud:

  1. Go to the JumpCloud console and select SSO and then add an application.

  2. Select Custom SAML App.

  3. In the Settings panel, apply these values (replace the your in your.paligoapp.com with the address of your Paligo instance, for example, acme.paligoapp.com).

    Name

    Value

    Display Label

    Paligo (example)

    IDP Entity ID

    paligo/jumpcloud/sso

    SP Entity ID

    https://your.paligoapp.com/saml/metadata

    ACS URL

    https://your.paligoapp.com/saml/acs

    Samlsubject NameID

    email

    Samlsubject NameID Format

    urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress

    Signature algorithm

    RSA-SHA256

    Attributes

    Create attributes for:

    user.firstname

    firstname

    user.lastname

    lastname

    user.email

    email

    Groups Attributes

    Include Group Attribute

    Checked. This option must be checked/enabled.

    Groups Attribute Name

    paligo.usergroup

  4. Select Save.

Next, you need to Create User Groups in JumpCloud .

You should create one user group for each Paligo user group (administrators, authors, contributors, reviewers, publishers, it admins or translation managers) in JumpCloud.

  1. Select Groups.

  2. Create a user group for each Paligo user group.

  3. Select the Applications tab.

  4. Select Paligo to associate the Paligo application with the user group.

  5. Select Save Group.

  6. Repeat this procedure for all Paligo user groups.

In JumpCloud, you need to associate the user accounts with the user groups that you have set up for Paligo.

  1. Select Users.

  2. Select the user you want to add to a Paligo user group.

  3. Select the User Groups tab.

  4. Select the checkbox for the Paligo user group that the user should belong to.

  5. Select Save user.

  6. Repeat this process for each user account that needs access to Paligo.

You can now Connect Paligo to your SSO Service.