Last updated: Jan 19, 2021 10:02
A user accesses the Perfecto cloud, such as https://mycloud.perfectomobile.com/.
- Perfecto forwards the request to the IdP, and the user is redirected to the IdP login page.
- The user logs in with the company credentials.
- The IdP validates the user against the user store.
The IdP sends SAML (Security Assertion Markup Language) assertion back to Perfecto. At a minimum, the SAML assertion response from the IdP must contain the desired username for the Perfecto cloud (if it is not the user's email, the cloud should be configured accordingly). The response typically also includes the email address, given name, and last name attributes as parameters, but they are not required to enable SSO.
- The user is authenticated and logged into the Perfecto Lab session.
SSO setup steps
Setting up SSO with Perfecto is a process that involves close cooperation between your company and Perfecto Support. It consists of the following steps:
- Discover: After finalizing IdP selection, Perfecto and the IdP need to replace SAML 2.0 metadata. See What Perfecto needs from your IdP below for instructions on how to obtain your IDP metadata. When you acquire the metadata, make sure it is validated against the SAML 2.0 XSD (for example, you can use this login validation tool: https://www.samltool.com/validate_xml.php).
Initial setup: Open a ticket with Perfecto Support that includes your IdP metadata. A member of the Perfecto Support team then sets up the connection from Perfecto (the SP) to your IdP.
Similarly, on your end, you need to set up the connection from your IdP to Perfecto using the Perfecto metadata file. See What you need from Perfecto to set up your connection below for details.
Test: Verify the SSO connection between the Perfecto cloud and your IdP with one or two users. After accessing the Perfecto URL, these users should be redirected to your IdP login page, where they enter their IdP user credentials. When the IdP provider accepts their credentials, they should be logged in to the Perfecto cloud.
Production setup: During this step, Perfecto enables the IdP configuration and migrates all users. The migration path depends on the type of usernames you use:
- Email usernames: Both your IdP and the Perfecto cloud use email usernames. In this case, Perfecto automatically migrates all cloud users to the new configuration during this session. For automated testing, you can either provide automation users in advance to be skipped or replace their security token after the session.
ID usernames: Your IdP uses ID usernames and your Perfecto cloud uses email usernames. In this case, Perfecto renames the email to an ID. You need to set up a comma-separated mapping file that correlates a user's email address in the Perfecto system with the user ID in the IdP system. For example:
johod@test.com,jdoe johod1@test.com,jdoe1 johod2@test.com,jdoe2
For more details about creating new users, see New users.
New users
When a new user gets added to the IdP system and passes identification, Perfecto automatically adds the user if it does not exist. For details, see Just-in-time (JIT) user provisioning. If you want to control a user's access to the Perfecto cloud, you can do this through the IdP authorization (by assigning the user to your Perfecto application within your IdP). You can also turn off JIT entirely by sending a request to Perfecto Support.
By default, all new users get created without assigned roles and device tokens. You can opt to configure roles and tokens globally if required. If you want to change role and token assignments for individual users, your admin can do this manually.
What you need from Perfecto to set up your connection
You need to obtain the Perfecto metadata file for your installation. Contact Perfecto SSO support personnel to supply the file. The file is in XML format and includes your installation license.
What Perfecto needs from your IdP
You need to supply the IDP metadata file to Perfecto. In addition, Perfecto requires that you configure:
NameID Policy Format to
unspecified
(optional but recommended)Audience Restriction/Audience URI to
empty
or to our entity ID, which ishttps://auth.perfectomobile.com/auth/realms/CLOUDNAME-perfectomobile-com
whereCLOUDNAME
is the name of your cloud- The following SAML user attributes:
NameID
email
firstName
lastName
SAML response example:
You also need to assign your IdP users to the Perfecto application within your IdP.
We recommend that you contact your IdP to:
- Extract the SAML 2.0 metadata file
- Assign users (also for optimal IdP configuration and setup).
Below are high-level instructions on how to do the above for some of the common IdPs. These instructions serve as a reference only. Make sure to verify them with your specific IdP.
For other or custom IdPs, contact your IdP directory to assist with obtaining the metadata file.
Also in this section:
Related articles: