All Collections
Settings and Account
Authentication
General Configuration Instructions for SSO SAML2-Based Authentication
General Configuration Instructions for SSO SAML2-Based Authentication
Updated over a week ago

The Vulcan Platform supports ALL SAML2-based SSO solutions and provides instruction for setting up SSO on Okta, OneLogin, and AzureAD platforms.

To set up your own SSO SAML2-based with Vulcan Cyber's SSO solution, you'll need to configure the SAML 2.0 integration between the two systems. Here's a general overview of the steps involved that are relevant to any SAML 2.0 tool:

  1. Go to your SSO solution and create a new SAML-2 application.

  2. In the application's setting, make sure to:

    1. Give the application an indicative name, such as "Vulcan SSO".

    2. Insert the following Vulcan's identifier in the relevant fields (Entity ID, Reply URL, and any other URL identifier). All URLs are identical, with the format:
      https://myinstanceID.vulcancyber.com/api/saml2_auth/acs/

      Make sure to replace "myinstanceID" with your own domain/environment name in Vulcan.

    3. Add the following statements and map them to the relevant values on your end (case sensitive):

      • givenname (user first name field on your end)

      • surname (user last name on your end)

      • name (user email address on your end)

      • For reference, we recommend looking into the following SSO attributes mapping configurations of the following vendors:

    4. Generate the XML metadata file.

  3. Go to the Vulcan Platform > Settings > Authentication

  4. Follow the instructions on the SSO configuration page, starting from Step 2.

  5. Test the SSO integration. Once the configuration is complete, perform thorough testing to ensure that the SSO integration is functioning as expected. This involves logging in to Vulcan Cyber's SSO using your SSO tool as the identity provider and verifying that the user is successfully authenticated.

Did this answer your question?