Skip to content
English
  • There are no suggestions because the search field is empty.

SAML Configuration

SAML integration can be implemented for users to access the Pisano system, and users can be managed from your existing index servers.

SAML Configuration screen can be accessed through the Pisano interface by navigating to Admin> Account Settings > SAML Configuration menu.

There are two methods for SAML configuration in Pisano:

  1. Using IDP Metadata
  2. Using Entity ID

In both methods, user management can be done in two different ways:

  1. Only user password authentication can be performed with SAML.
  2. In addition to password authentication, synchronization of user roles and permissions, employment status (working/resigned), and organizational unit information can be achieved.

If you want to manage the roles and permissions of users entering the system through SAML integration in addition to password authentication, you can activate the "Create or Update User" option. This will allow you to access the Defaults and Attributes pages required for these synchronization settings.

Screenshot 2024-05-23 at 21.16.55

 

When this option is not enabled:


- User synchronization will not be performed, so users entering the system will need to be defined in the system with Pisano invitations.
- Only password authentication will be performed via SAML. Role and permission management will be handled through Pisano authorization screens and definitions.
- Users not defined in Pisano will not be able to access the system.

Setting Up SAML Integration Using IDP Metadata

This is the most commonly used method. If you want to proceed with this method, the following option needs to be activated in the Pisano interface:

Screenshot 2024-05-23 at 21.19.22

SP Certificate and SP Private Key values are Pisano certificate details. First, it's necessary to create a valid certificate. Online tools can be used for this purpose. For example: Generate SAML Self-Signed X.509 Certificates - Create Self Signed Certs | SAMLTool.com

When you click on the above page, you can create a certificate by entering the following information in the opened area:

Country name: Turkey

State or Province: Istanbul

Organization Name: Customer Organization Name

Common Name, the domain: Pisano API URL

 The API URL information will be shared with you by Pisano.
 For on-premises customers, the API URL information should be replaced with the information in the api_host variable within the API configmap (ENV) by the system administrator.

Valid Days: 365

Bits to generate the private key: 1024 bits

Digest Algorithm: SHA256

After filling out the fields as shown above, you can generate the certificate and key by clicking the "GENERATE SELF-SIGNED CERTS" button.

SAML

When you click the button, you will obtain the Private Key and X.509 Certificate information as shown below:

SAML-1

In the Pisano SAML Configuration screen:
  • Paste your system's metadata into the "IDP Metadata Settings" field,
  • Paste the Private Key value obtained from the site into the "SP Private Key" field,
  • Paste the X.509 Cert value obtained from the site into the "SP Certificate" field.

Once you save the configuration, the necessary settings for integration will be completed.

Afterward, you can start your testing by configuring the metadata you receive from Pisano within your SAML services.

You can access the Pisano Metadata as follows (you can obtain {pisano_api_URL} and {Account_ID} information from Pisano teams):

{pisano_api_URL}/v1/saml/{Account_ID}/metadata

For example: https://api.pisano.com.tr/v1/saml/Pisano-cx-tool/metadata

Setting Up SAML Integration Using Entity ID

If you are not using IDP Metadata, you can also integrate using the IDP Entity ID and Fingerprint information.

Screenshot 2024-05-23 at 21.20.46

You can directly use the IDP Entity ID value found in your metadata. You can generate the Fingerprint value using online tools. For example: SAML X.509 Certificate Fingerprint - Online SHA1 Decoder | SAMLTool.com

Paste the X.509 certificate value into the form, select "sha256" as the Algorithm, and then calculate the Fingerprint by clicking the "CALCULATE FINGERPRINT" button.

SAML-3

In the Pisano SAML Configuration screen:

  • Paste your own system's 'IDP Entity ID' information into the 'IDP Entity ID' field,
  • Paste the FingerPrint value obtained from the site into the 'IDP Certificate Fingerprint' field,
  • Paste the 'IDP Single Sign-on URL' and 'IDP Single Logout URL' values found in your metadata into the respective fields.

Once you save the configuration, the necessary definitions for integration will be made.

Afterward, you can start your testing by configuring the metadata you receive from Pisano within your SAML services.

You can access the Pisano Metadata as follows (you can obtain {pisano_api_URL} and {Account_ID} information from Pisano teams):

{pisano_api_URL}/v1/saml/{Account_ID}/metadata

For example: https://api.pisano.com.tr/v1/saml/Pisano-cx-tool/metadata

 

Defaults:

Here, you can define the necessary configuration values for default user login. If the Role and Branch values are empty in the values ​​coming through SAML, the user will be logged into the system with the default values defined in this area:

Screenshot 2024-05-23 at 21.24.24

Attributes:

In the Attributes tab, a person's title, department, and role fields can be defined.

The organizational hierarchy is not automatically updated in Pisano. Only the incoming user information is automatically assigned in Pisano.

VALUE TO BE ASSOCIATED WITH THE ORGANIZATIONAL UNIT: This refers to the attribute value of the "Organizational Unit" code to be read from LDAP. When a user logs into Pisano, the value of this attribute will be searched within the Pisano Customer Organizational Hierarchy (External Unit ID), and the logging-in user will be assigned to the corresponding organizational unit if a match is found. If no match is found, the login process is managed according to the selections made on the "Defaults" page.

Screenshot 2024-05-23 at 21.31.09

Branch

TITLE LOOKUP ATTRIBUTE: Indicates the attribute from which the title values ​​of users coming from LDAP will be read.

ROLE LOOKUP ATTRIBUTE: Indicates the attribute from which the role values ​​of users coming from LDAP will be read.

For each User Type and User Role defined in Pisano, a mapping table should be created based on the role values ​​coming from LDAP, as shown in the image below with blue framing. For example, if the value coming from the "Role" attribute in LDAP is "IT ADMIN", the user will log in to Pisano with the "Manager" role according to the mapping table below. 

Screenshot 2024-05-23 at 21.07.53

STATUS LOOKUP ATTRIBUTE: Indicates the attribute from which the employment status values ​​of users coming from LDAP will be read. It is not mandatory.

The User Status information in the section framed in red below allows the information to be updated with the matching information from LDAP, and users are listed in Pisano with this status.

Screenshot 2024-05-23 at 21.12.01