PartnerPage supports SAML 2.0 and OIDC SSO connections via our identity provider, Auth0. This functionality is included in our Enterprise plan, or can be purchased a-la-carte for our Growth plan customers. If you don't know what plan you are on, please reach out to support@partnerpage.io, or visit your in-app billing view.
All SSO connections are set up with our engineering team at this time. There is no self-serve SSO configuration available in the application.
How to set up a SAML 2.0 connection:
Please provide your customer support representative with all of the following information:
Sign In URL: The URL where SAML authentication requests are sent. This is also called the single sign-on (SSO) endpoint.Sign Out URL: The URL where SAML logout requests are sent. This is also called the single logout (SLO) endpoint.X509 Signing Certificate: The public-key certificate of the identity provider (IdP). This is required by Auth0 to validate the signature of the authentication assertions that have been digitally signed by the IdP. Auth0 accepts the.pemand.cerformats.The list of email domains the Enterprise Client uses for user authentication. Typically, a single domain is used for authentication via SSO. If your company uses multiple domains, for example for different subsidiary brands or for contractor workers, then you need to provide a list of all domains that should be captured for SSO authentication.
Verification that your SAML IdP provides the user’s email in a SAML attribute of the SAML assertions. The email SAML attribute field name must be
"<http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress>"
Once the PartnerPage engineering team has received the above information, we will provide you the following information for your IdP configuration, including the proper connection name in the place of <SAML_CONNECTION_NAME>:
Assertion Consumer Service URL (aka post-back URL):
https://login.partnerpage.io/login/callback?connection=<SAML_CONNECTION_NAME>
Entity ID:
urn:auth0:outwork:<SAML_CONNECTION_NAME>
Other standard configuration details are:
Protocol Binding:
HTTP-POST
Sign Request Algorithm
RSA-SHA256
Sign Request Algorithm Digest
SHA256
PartnerPage certificate:
If your IdP supports importing of SAML configurations with an XML file, then PartnerPage will provide a link like the following:
https://login.partnerpage.io/samlp/metadata?connection=<SAML_CONNECTION_NAME>
How to set up an OIDC connection:
Please provide your customer support representative with the following information:
OpenID Connect Discovery URL: The well known OpenID Connect discovery endpoint. (What is Well-known?)Client ID: The public identifier for the application that is requesting authentication from the identity provider, in this case the ID for PartnerPage that you have set up in your IdP.Client Secret: The key value associated the with above Client ID. Be sure to share this securely, as it is sensitive.
If your IdP doesn't provide a discovery URL, you can send an OpenID Connect Metadata file instead, which is a JSON file of the configuration details.
PartnerPage support back channel connections for OIDC configurations.
