Single Sign-On and Active Directory Integration
Command 360 supports any SAML2-based authentication single sign-on (SSO) and active directory (AD) integration. This is configured during system installation while setting up a Third-Party Identity Provider (IdP).
Note
In the context of SAML endpoints, all URLs are case-sensitive.
SAML Certificate Generation
Before configuring Third-Party IdP settings, the admin of the SSO system needs to create an SAML application, then generate an SSO signing certificate. Use the following values when generating the certificate:
- Assertion Consumer Service URL:
https://<FQDN of the Command 360 Manager>/Haivision/Authorization/Saml2/Acs
- Audience:
https://haivision/external/identity
Third-Party System & Admin Settings
The following fields from the generated SAML certificate are necessary to complete SSO setup on Command 360:
Setting | Description | Example |
---|---|---|
System Settings | ||
Issuer | This is a URL that uniquely identifies your IdP. | https://exampleidp.com/aaaabbbb-0000-cccc-1111-dddd2222eeee/ |
Login URL | The SAML service provider URL the user signs in to. | https://mysso.exampleidp.com/home/mysso |
Metadata URL | The URL for the service provider from which user metadata is sent. | https://mysso.exampleidp.com/app/abcde12345/sso/saml/metadata |
Admin Settings | ||
IdP Admin Role Attribute | An attribute from your SAML token that identifies a user that should be granted the Command 360 admin role for initial setup. This maps to the Hai_Admin XREF value (see Roles and Permissions). | Org_AdminUser |
IdP Admin Root Access Attribute | An attribute from your SAML token that identifies a user that should be granted the Command 360 admin access group for initial setup. This maps to the Hai_Root XREF value (see Access Groups). | Org_RootAccess |