Configure a SAML 2.0 Identity Provider to manage your directory of users in Banyan
- Updated on Jun 18, 2021
- 1. In the Banyan Command Center, configure your User Identity Provider
- 2. In your SAML Identity Provider, create a new App called “Banyan TrustProvider”
- 3. In your SAML Identity Provider, set up Attribute Mappings
- 4. Assign the “Banyan TrustProvider” SAML App to be accessed by everyone
- 5. From the Banyan TrustProvider app in your SAML IDP, take note your SSO URL and download the Certificate
- 6. Save the SAML 2.0 IDP fields in the Banyan Command Center
SAML 2.0 is the leading standard to implement single sign-on. Banyan integrates with your SAML Identity Provider, via the SAML 2.0 HTTP POST binding, to authenticate enterprise users that need access to Banyan secured services.
In order to set up this integration, you need will need administrative access to your SAML Identity Provider and the ability to add a new SAML App.
1. In the Banyan Command Center, configure your User Identity Provider
1a. Navigate to Settings > TrustProvider Settings > Identity Provider and then set your User Identity Provider to SAML.
You will fill out these Identity Provider configuration fields after you set up the new application integration in SAML IDP.
1b. Take note of the Redirect URL (ACS) provided in the configuration field. You will need it for the steps in SAML IDP below.
2. In your SAML Identity Provider, create a new App called “Banyan TrustProvider”
When asked for
Assertion Consumer Service (ACS) URL,
SP SSO URL, or
Recipient SSO URL in the SAML Identity Provider, use the Redirect URL you obtained in Step 1b above.
If you’re asked for the
RP/SP Entity ID, use the Redirect URL as well.
NameID format in your IDP is set to
Persistent; Banyan TrustProvider does not support other formats right now.
3. In your SAML Identity Provider, set up Attribute Mappings
Banyan requires your IDP’s returned SAML assertion to contain attributes can be mapped to a user’s Email, Username, and Groups.
Configure that mapping in this step, and take note of the names for the Email Attribute, Username Attribute, and Groups Attribute.
4. Assign the “Banyan TrustProvider” SAML App to be accessed by everyone
Allow Banyan to federate authentication of all users in your organization to your SAML IDP.
You still need to apply Policies in the Banyan Command Center to manage which users can access specific internal applications.
5. From the Banyan TrustProvider app in your SAML IDP, take note your SSO URL and download the Certificate
Note down the data you need to enter in the next step.
6. Save the SAML 2.0 IDP fields in the Banyan Command Center
6a. Return to the Identity Provider page in the Banyan Control Center (Settings > TrustProvider Settings > Identity Provider) and enter the Banyan TrustProvider App parameters from your SAML IDP:
- IDP SSO URL (from Step 5)
- Entity Issuer (Optional) If set, the entity issuer value will override SSO URL as the required audience.
- IDP CA Certificate (from Step 5)
- Username Attribute (from Step 3)
- Email Attribute (from Step 3)
- Groups Attribute (from Step 3)
- Groups Delimiter – Do not use this field. Entering an incorrect value may lead to configuration errors and behavior issues. Please contact Banyan Support for assistance.
3b. Click Update Identity Provider Config to save the settings.
That’s it! You have successfully integrated your SAML IDP to manage your directory of users in Banyan.