The Vulcan Cyber ExposureOS Platform supports ALL SAML2-based SSO solutions and provides instruction for setting up SSO on Okta, OneLogin, and AzureAD platforms.
To set up your own SSO SAML2-based with the Vulcan Cyber ExposureOS SSO solution, you'll need to configure the SAML 2.0 integration between the two systems. Here's a general overview of the steps involved that are relevant to any SAML 2.0 tool:
Go to your SSO solution and create a new SAML-2 application.
In the application's setting, make sure to:
Give the application an indicative name, such as "Vulcan SSO".
Insert the following Vulcan Cyber ExposureOS identifier in the relevant fields (Entity ID, Reply URL, and any other URL identifier). All URLs are identical, with the format:
https://myinstanceID.vulcancyber.com/api/saml2_auth/acs/
Make sure to replace "myinstanceID" with your own domain/environment name in the Vulcan Cyber ExposureOS.
Add the following statements and map them to the relevant values on your end (case sensitive):
Generate the XML metadata file.
Go to the Vulcan Cyber ExposureOS platform > Settings > Authentication.
Follow the instructions on the SSO configuration page, starting from Step 2.
Test the SSO integration. Once the configuration is complete, perform thorough testing to ensure that the SSO integration is functioning as expected. This involves logging in to Vulcan Cyber's ExposureOS SSO using your SSO tool as the identity provider and verifying that the user is successfully authenticated.