Administration

Single Sign-On

Available for

  • Ultimate and Enterprise editions

Get in touch with Sales for licensing questions.

Single Sign-on (SSO) allows Memsource users to log in to Memsource via third-party applications. Memsource enables integrations with identity providers (IdPs) compliant with the SAML 2.0 protocol. Existing usernames and passwords remain valid if SSO is deactivated.

Enable Single Sign-On

Prerequisite: Administrator Login

To enable Single Sign-On, follow these steps:

  1. From the Setup Setup_gear.png page, scroll down to the Single Sign-On section and click on Details.

    The Single Sign-On page opens.

  2. Select Enable SSO for your organization.

    Configuration details are presented.

  3. Complete the following fields:

    The first five fields should be completed using information from an IdP. (For more information about configuring SSO for OneLogin, see OneLogin documentation.)

    • Certificate Fingerprint

      This is used to validate the authenticity of the IdP. Depending on fingerprint generation, it is delimited by either colons or spaces. If authentication is not successful, switch the colons and spaces in the fingerprint to ensure it is correctly applied.

    • Certificate Fingerprint Algorithm

    • Issuer URL

      This value is provided by the IdP to uniquely identify your domain.

    • SAML 2.0 Endpoint (HTTP)

      This is the URL that Memsource will call to request a user login from the IdP. The IdP authenticates and logs in users.

    • SLO Endpoint (HTTP)

      When users log out of Memsource, this URL is called to log them out of the IdP.

    • Landing URL (Optional)

      Choose the URL of the web page that users will see when they log out of Memsource, e.g. a list of applications available to them in the IdP.

    • Key User Identifier

      Select whether users will identify themselves using a USERNAME or an EMAIL address. Memsource requires a unique username by default, but users can opt to use the same email address multiple times. Choosing the EMAIL option will require users to use a unique email address.

    • Domain name

  4. Click Save.

    Settings are applied for the organization.

SCIM Configuration

To configure SCIM properties, follow these steps:

  1. Select Enable SCIM.

    SCIM configuration details are presented.

  2. Click Generate New Token.

    The SCIM Bearer Token field is populated with a unique token.

  3. Copy the token and the SCIM Base URL.

    These will be used in identity provider settings.

  4. Click Save.

    Configuration is saved.

User Management

Note: If SSO is enabled in your organization, emails sent to any newly created users will not include a password generation link as the main means of access to Memsource is via SSO.

Options:

  • Allow users to change their login credentials

    Uncheck this box to prevent users from editing their usernames, passwords, and emails. Can be used to force users to access Memsource only through SSO (as SSO uses a different authentication method).

  • New users mapped to

    Sets default user role for new users created via SSO. The Linguist role is selected by default.

Application Details

Organization ID and the Domain URL can be used by an IdP to configure Memsource as the recipient application and to establish the connection.

Some SSO providers require Entity ID / Metadata URL, ACS URL or SLS URL.

If required, use:

  • Entity ID/Metadata URL: https://cloud.memsource.com/web/saml2Login/metadata/{orgId}

  • ACS URL: https://cloud.memsource.com/web/saml2Login/sacs/{orgId}

  • (Optional) SLS (Single Logout Service) URL: https://cloud.memsource.com/web/saml2Login/ssls/{orgId}

Was this article helpful?

Sorry about that! In what way was it not helpful?

The article didn’t address my problem.
I couldn’t understand the article.
The feature doesn’t do what I need.
Other reason.

Note that feedback is provided anonymously so we aren't able to reply to questions.
If you'd like to ask a question you can leave a public comment below or Submit a request to our Support team.
Thank you for your feedback.

Comments

0 comments

Article is closed for comments.