Sentinel Help Center
  • Sentinel Overview
    • Dashboard
    • Environments
    • User Hub
    • Requests
    • Reports
  • Installation & Updates
    • Sentinel Shortcuts [From PS]
    • Sentinel VM Requirements
    • Host Server Setup RHEL/CentOS 8
    • Host Server Setup RHEL/CentOS 9
    • Sentinel Server Update
    • Oracle Database Account
    • PostgreSQL Backups
  • Settings
    • Sentinel Accounts
    • Databases
    • System Settings
    • Single Sign-On
    • Access Request Settings
    • Role Groups
    • Role Approvers
    • Custom Forms
    • Sensitive Data Settings
    • Security Log
  • Security Administration
    • Menu Functions
    • Direct Access
    • Users
      • User Access Updates
      • User Profile Features
    • Roles
      • Role Updates
      • Role Features
    • Permission Lists
      • Permission List Updates
      • Permission List Features
    • Dynamic Security
    • Temporary Access
    • Fluid Security
    • Security Matrix
    • Compare Reports
  • Security Reports
    • Security Reports Setup
    • Page Analysis
    • User Access
    • Role Access
    • Permission List Access
    • Query Analysis
    • Compare Users
    • PeopleTools Access
    • Portal Menus
  • Audit Review
    • Audit Review Setup
    • Privileged Access
    • Sensitive Data
    • Segregation of Duties
    • Correction Access
    • Restricted Roles
    • Role Changes
    • Notifications
    • Manager Reports
  • Access Requests
    • Implementation Guide
    • Submit New Request
    • Review & Approve Requests
    • Workflows & Routing
    • Apply Changes
  • Resources
    • User Training Guide
    • Policies
      • Policy Overview
      • Data Privacy
      • Cloud Security
      • Software Development
      • Disaster Recovery
      • Service Level Agreement
      • Employees
Powered by GitBook
On this page
  1. Settings

Single Sign-On

Settings - Single Sign-On

PreviousSystem SettingsNextAccess Request Settings

Last updated 2 years ago

Sentinel supports SAML 2.0 for single sign-on login authentication, providing an additional layer of security when accessing the application.

*This is the recommended login authentication method.

Security Assertion Markup Language is an XML-based, open-standard data format for exchanging authentication and authorization data between security domains: an Identity Provider (IDP) and a Service Provider (SP). SAML 2.0 enables web-based authentication and authorization scenarios, including cross-domain single sign-on (SSO).

An IDP Certificate and IDP URL are required to complete the setup.

IDP Attributes
  • The following data attributes should be sent from your IDP Provider:

Set Up Single Sign-On
  1. Navigate to Settings - Single Sign-On.

  2. Input the 'Identity Provider URL.'

  3. Input the ' Identity Provider Certificate.'

  4. Once a configuration is saved, Sentinel will generate a Metadata URL, Sentinel Callback URL, and Sentinel Direct Login Link. *These are used to complete the IDP setup and service connection.

  5. Set up attributes mapping on your IDP to match Sentinel IDP attributes:

  6. Save changes.

  7. Toggle the 'SAML ON/OFF' switch after updating settings.

  • After a successful configuration, a new SSO Login button will appear on the login screen. Sentinel also provides a direct SSO login URL that can be used to initiate login through your IDP. This URL can be found under the Sentinel Direct Login Link.

Assign Default Access for New SSO Users

First-time users that use the single sign-on (SSO) login may be automatically given access to one or more PeopleSoft environments in Sentinel.

A Sentinel user will only receive access to environments for which they have access profiles.

  • Default Profiles will be assigned to all signed-up users via SAML integration.

*If your IDP uses different field names in the Attributes section, map the IDP field names to the corresponding Sentinel field names.