Security Assertion Markup Language (SAML) is an XML standard that allows secure web domains to exchange user authentication and authorisation data. Using SAML, an online service provider can contact a separate online identity provider to authenticate users who are trying to access secure content.
CompliSpace Fundamentals offers a SAML based Single Sign-On (SSO) service that provides customers with full control over the authorisation and authentication of hosted user accounts that can access the CompliSpace Fundamentals web-based application. Using the SAML model, CompliSpace acts as the service provider and provides services such as Fundamentals. CompliSpace customers act as identity providers and control usernames, passwords and other information used to identify, authenticate and authorise users for web applications that CompliSpace hosts. There are a number of existing open source and commercial identity provider solutions that can help you implement SSO with CompliSpace Fundamentals.
The CompliSpace SSO service is based on the SAML v2.0 specifications. SAML v2.0 is supported by several widely known vendors.
The following process explains how a user logs into the CompliSpace Fundamentals application through an organisation’s, SAML based SSO service.
Figure 1, shown below, illustrates the process by which a user logs in to the CompliSpace Fundamentals application through a SAML based SSO service. The numbered list that follows the image explains each step in more detail.
Figure 1: Logging in to CompliSpace Fundamentals using SAML
This image illustrates the following steps:
CompliSpace Fundamentals requires several claims/assertions that your SAML IdP must provide in order to work correctly. These can be provided using either the short name
, url scheme
or urn oid
The claims in the short name
format include:
givenName
- The first name of the usersn
- The surname of the usermail
- The email address used by the userobjectGUID
- A unique identifer for the user that is persistent even if the user changes name or email addressmemberOf
- The list of groups the user belongs in the Distinguished Name (DN) format or as a simple string.For the full list of claim maps in all formats, please see the Google Sheets Document, SAML Required Attributes
CompliSpace Fundamentals has a rather thorough permissions system, but has been simplified for integration with SSO. First, if you want a user to have any kind of access to Fundamentals they must belong to a group called Fundamentals
. This allows you to temporarily remove access to a user without having to remove and re-add all the detailed permissions.
Fundamentals partitions content into sections such as Public (available to all staff), HR Admin (only available for your Human Resources staff), etc. Please contact your CRM for details on sections availble to your installation. A user with access to a section may have read only (RO) or read/write (RW) access.
Section access is granted by ensuring the user belongs to a group that is made by taking the section name
and appending either RO
or RW
as required for the access they require.
For example, if you wish for a user to have read only access to the Public section then they must belong to a group called Public RO
. Should the user require read/write access then they must belong to a group called Public RW
.
All characters in a group must match exactly. For example, the section called Human Resources (Admin Only)
can be granted read only access to a user by assigning them to a group called Human Resources (Admin Only) RO
The format for the group name can be either a simple string or in the Distinguished Name (DN) format.
With the DN format, only the CN RDN component is used.
Example: CN=Human Resource (Admin Only) RO,OU=Fundamentals,OU=CompliSpace,OU=Vendors,DC=complispace,DC=net