Single Sign On (SSO) is an enterprise security feature that allows organizations to:
NoahFace supports SSO by integrating with 3rd party platforms that support the Security Assertion Markup Language (SAML 2.0) standard. For example:
SSO functionality is available to all NoahFace customers on Enterprise Plans.
Employees can sign in using SSO by navigating to the NoahFace Dashboard login panel and selecting Sign In with SSO:
They then enter their SSO Domain (eg: the name of the company they work for) and press Sign In:
If they are already logged in to their SSO platform, they will be immediately logged into NoahFace, otherwise they will be automatically redirected to the login screen for their SSO platform.
Single Sign On is must be configured both in the NoahFace Dashboard and in your SSO platform. The NoahFace settings can be found under Security Settings:
Each of the settings are explained below:
SAML Single Sign On. Enable this switch when you have completed your setup and are ready to test your SSO process.
SSO Domain. This is a user-defined identifier that links the NoahFace sign in panel to your Organization, and is typically your company name (eg: "Acme"). If you have multiple NoahFace Organizations, each Organization must have a unique identifier (eg: "Acme Dev", "Acme Test", "Acme").
NoahFace Dashboard Single Sign-On URL. This is a link that can be shared with users so they can directly navigate to the NoahFace Dashboard, without first navigating to the NoahFace Dashboard Sign In panel.
NoahFace Identifier (Entity ID). This is a system-defined unique identifier for your Organization. It will be needed when you set up NoahFace as a resource within your SSO platform.
NoahFace Assertion Consumer Service (ACS) URL. This is a link that your SSO platform calls as part of the SSO process. It will be needed when you set up NoahFace as a resource within your SSO platform.
SAML Entity Id. This is the identifier assigned to NoahFace within your SSO platform. You will need to copy it from your SSO platform and paste it here.
SAML Sign-On URL. This is the URL to the sign on screen for your SSO platform. You will need to copy it from your SSO platform and paste it here.
SAML Certificate Fingerprint. This is the public certificate used to encrypt the SSO process. You will need to copy it from your SSO platform and paste it here.
SAML Logout Redirection URL. This is the URL that the NoahFace Dashboard redirects to when a user signs out.
To configure NoahFace SSO in Okta, select Create App Integration under Applications and select SAML 2.0:
In section one of Create SAML Integration (General Settings), enter the name "NoahFace". If you have multiple NoahFace Organizations, you should choose an appropriate name for each (eg: "NoahFace Dev", "NoahFace UAT", "NoahFace"). You can optionally add the NoahFace logo so that it will appear in the Okta Dashboard.
In section two of Create SAML Integration (Configure SAML):
Once you have saved your integration, select the Sign On tab for your "NoahFace" application and expand the More Details section under SAML 2.0. You can then:
You can then assign users and groups to the "NoahFace" application on the Assignments tab.
To configure NoahFace SSO in Microsoft Azure, select New Application under Enterprise Applications and enter the name "NoahFace". If you have multiple NoahFace Organizations, you should choose an appropriate name for each (eg: "NoahFace Dev", "NoahFace UAT", "NoahFace"):
Select Assign Users and Groups and assign the users or groups you want to have access to NoahFace:
Select Set Up Single Sign On:
Select SAML:
In section one of Set up Single Sign-On with SAML:
In section three of Set up Single Sign-On with SAML:
In section four of Set up Single Sign-On with SAML:
Users must be provisioned in NoahFace and assigned a Dashboard Role (ie: Administrator, Manager, Viewer) in order to sign in with SSO.
Users are automatically provisioned in NoahFace on the next scheduled synchronization after they are added to your HR platform (assuming they meet your synchronization filtering criteria). The NoahFace user identifier is a user's email address, so email addresses must always be provided as an attribute in your synchronization.
Users are automatically unprovisioned in NoahFace on the next scheduled synchronization after they are terminated in your HR platform.
Users can be assigned a Dashboard Role either automatically, as part of your user synchronization, or manually, from within the NoahFace Dashboard.
Once you have configured NoahFace, configured your SSO Platform, and provisioned your users, you are ready to test Single Sign On to the NoahFace Dashboard.
To do this, enable Single Sign-On as follows (when you do this, both Local Sign-On and SSO will be possible):
Finally, assuming everything is working, you can disable Local Sign-On as follows: