Skip to main content

SSO Configuration

SmartLink acts as an Identity Provider (IdP) and supports two SSO protocols: SAML 2.0 and OpenID Connect (OIDC). Your external applications delegate authentication to SmartLink — your users log in once and access all their applications.

Accessing Authentication Configuration

From the list of applications, open the actions menu of an application, then click on Edit.

Click on Edit to access the application settings

On the application page, select the Authentication tab. Then choose the desired protocol from the dropdown menu: SAML2 or OIDC.


SAML 2.0 Configuration

Select SAML2 from the dropdown menu to activate this protocol.

01.authentication-tab---saml-type-selected

Service Provider Settings

The Service Provider tab contains the information of the external application (SP) to be declared in SmartLink so that it can send SAML assertions to it:

ParameterDescription
Entity IDUnique identifier of the external application (Service Provider)
ACS URLURL of the external application receiving SAML assertions (Assertion Consumer Service)
SLO URLURL for logging out of the external application (Single Logout Service)
CertificatePublic certificate of the Service Provider to verify its signed requests
Private KeySmartLink's private key to sign the assertions sent to the Service Provider

Enter the parameters provided by your external identity provider

Identity Provider Settings

The Identity Provider tab exposes SmartLink's (IdP) endpoints to be configured in your external application:

ParameterDescription
Entity IDUnique identifier of SmartLink as an identity provider
SSO URLSmartLink's SSO endpoint where the application redirects the user
Metadata URLURL of SmartLink's XML metadata file (automatic import possible)
MetadataRaw content of the metadata file

Advanced options allow adjusting the signature and protocol behavior:

OptionDescription
Sign assertionsSmartLink signs the SAML assertions sent to the Service Provider
Sign requestsSmartLink signs the authentication requests
Use HTTPAllows HTTP connections (not recommended in production)

03.saml-identity-provider-config


OIDC Configuration

Select OIDC from the dropdown menu to activate the OpenID Connect protocol.

04.authentication-tab---oidc-type-selected

Provider Settings

The Provider Settings tab exposes the OIDC endpoints automatically generated by SmartLink:

EndpointDescription
Discovery EndpointURL for automatic discovery of the OIDC configuration
Authorization EndpointOAuth2 authorization URL
Token EndpointURL for exchanging authorization code for a token
JWKS EndpointURL for public keys used to sign tokens
Userinfo EndpointURL for retrieving user information

It also allows configuration of:

  • Client Secret: shared secret between SmartLink and your client application
  • PKCE: enhances security of the authorization code flow (recommended)
  • Subject Identifier: field used as a unique user identifier in tokens (membershipId or email address)
  • Allowed Scopes: scope of accessible data (openid, profile, email, phone)
  • Redirect URIs: authorized URLs for redirection after authentication

05.oidc-provider-endpoints

06.oidc-scopes-and-redirect-uris

Client Configuration

The Client Settings tab provides a ready-to-use code example to integrate SmartLink as an OIDC provider in your application.

07.oidc-client-settings


Integration Guides

Step-by-step guides are available to configure SSO with the following applications: