Integrating Auth0

This documentation is a detailed guide for setting up single sign-on (SSO) through Auth0, leveraging SAML 2.0 or OIDC.

The following procedures require copying and pasting information between Auth0 and the Delinea Platform. We recommend opening both applications before you begin, and keeping both open until you are finished.

You do not need to configure both OIDC and SAML applications for your integration. Depending on your organization's infrastructure and preferences, you can choose either OIDC or SAML.

Prerequisites

On the Delinea Platform, you need to be an Admin with federation privileges.

Build an Auth0 SAML Application

  1. From the left navigation menu, click Applications.

  2. On the Applications page, click Create Application.

    Alt

  3. On the Create Application page, enter a name for your Auth0 new SAML application, such as Auth0 SAML.

  4. Choose Regular Web Applications.

  5. Click Create.

  6. On your Auth0 new SAML application page, click the Settings tab.

    Alt

  7. Scroll down to Allowed Callback URLs.

  8. Paste the following: `https://[HOST-NAME].delinea.app/identity-federation/saml/assertion-consumer'

  9. Replace [HOST-NAME] with the host name you selected when you created your tenant.

    Alt

  10. Click Save Changes.

  11. Click the Add ons tab.

  12. Click the toggle to enable SAML 2.

    Alt

    The Addon: SAML2 Web App page opens.

  13. From the Usage tab, next to Identity Provider Metadata and Identity Provider Certificate, click Download.

    Alt

    Identity Provider Metadata is an XML-formatted document that contains configuration information necessary for Delinea Federation to authenticate against the identity provider and includes the required endpoint URLs, bindings, and certificates.

  14. Click the Settings tab.
  15. Scroll to the bottom and click Enable.
  16. Click Save.

Add the Provider to the Platform

  1. Log on to the platform,

  2. Click Settings from the left navigation, then click Federation Providers.

  3. Click Add Provider.

  4. Select SAML from the drop-down menu. The Add Provider page opens.

Settings

In the Settings section, the first fields are automatically populated when you select the SAML provider configuration file and click Apply.

  1. SAML provider configuration: Click Select file.

  2. Navigate to and select the federation metadata XML file you downloaded.
    The word, Apply appears above the right end of the SAML provider configuration field.

  3. Click Apply. The words Uploaded successfully will appear next to SAML provider configuration, and the empty fields below will be auto-populated:

    • Name: Auto-generated from metadata

    • Protocol: SAML (auto-filled)

    • Status: Disabled

    • Entity ID [example: https://sts.windows.net/808444af-4011-40d5-9b0a-a9a5c95f88e9/]

    • IDP Certificate: Click Select File, then navigate to and select the Signing Certificate file you downloaded, to populate the following fields:

      • Signature

      • Algorithm

      • Thumbprint

      • Not valid before

      • Not valid after

      • Issuer

  4. IDP Login URL: Paste in the Login URL from your Auth0 application.

  5. IDP Logout URL: Paste in the Logout URL from your Auth0 application.

  6. Platform Callback URL: https://[HOST-NAME].delinea.app/identity-federation/saml/assertion-consumer. Copy the Platform Callback URL to paste into the Allowed Callback URLs field in your Auth0 application.

  7. Platform Logout URL: https://[HOST-NAME].delinea.app/identity-federation/saml/logout-consumer

  8. Status: Select the box next to Enabled.

Advanced Settings

See Advanced Settings (SAML only) under Federation Management.

Attribute Mappings

See Attribute Mappings under Federation Management.

Adding Custom Claims

See the following references for information on adding custom claims for Auth0:

Create Custom Claims

Sample Use Cases: Scopes and Claims

Group Mappings

See Group Mapping under Federation Management.

User Mappings

See User Mappings under Federation Management.

Domains

  1. Click Add Domain and enter the domain from the email addresses of the users you are including in this federation.

  2. Optionally enable the Status of the provider.

  3. When all required fields are populated, click Add Provider.

Build an Auth0 OIDC Application

The following procedure requires copying and pasting information between Auth0 and the Delinea Platform. We recommend opening both applications before you begin, and keeping both open until you are finished.

  1. From the left navigation menu, click Applications.

  2. On the Applications page, click Create Application.

  3. On the Create application page, enter a name for your Auth0 new OIDC application.

    Alt

  4. Select Regular Web Applications.

  5. Click Create.

  6. On your Auth0 new OIDC application page, click the Settings tab.

    Alt

  7. Scroll down to the Basic Information section.

    In the next steps, you will copy the Domain, Client ID, and Client Secret from the Basic Information fields shown below, and paste them into fields on your Delinea Platform.

    Alt

Add the Provider to the Platform

  1. Click Settings from the left navigation, then click Federation Providers.

  2. Click Add Provider.

  3. Select OIDC from the drop-down menu. The Add Provider page opens.

Settings

  1. Name: Enter a unique name.

  2. Status: Select the box next to Enabled.

  3. Endpoint URL: Paste the URL from your Auth0 new OIDC application page Domain field.

  4. Client ID: Paste the Client ID from your Auth0 new OIDC application page.

  5. Client Secret: Paste the Client Secret from your Auth0 new OIDC application page.

  6. Prompt: See Prompt for Re-authentication (OIDC only) under Federation Management.

  7. Platform Callback URL: Copy the Callback URL. On your Auth0 new OIDC application page, scroll to Application URLs and paste the copied callback URL into the Allowed Callback URLs field.

Attribute Mappings

See Attribute Mappings under Federation Management.

Group Mappings

Also see Group Mapping under Federation Management.

User Mappings

See User Mappings under Federation Management.

Domains

  1. Click Add Domain and enter the domain from the email addresses of the users you are including in this federation.

  2. Optionally enable the Status of the provider.

  3. When all required fields are populated, click Add Provider.