Sentinel supports SAML 2.0 for single sign-on login authentication, providing an additional layer of security when accessing the application.
*This is the recommended login authentication method.
Security Assertion Markup Language is an XML-based, open-standard data format for exchanging authentication and authorization data between security domains: an Identity Provider (IDP) and a Service Provider (SP). SAML 2.0 enables web-based authentication and authorization scenarios, including cross-domain single sign-on (SSO).
An IDP Certificate and IDP URL are required to complete the setup.
IDP Attributes
The following data attributes should be sent from your IDP Provider:
Set Up Single Sign-On
Navigate to Settings - Single Sign-On.
Input the 'Identity Provider URL.'
Input the ' Identity Provider Certificate.'
Once a configuration is saved, Sentinel will generate a Metadata URL, Sentinel Callback URL, and Sentinel Direct Login Link. *These are used to complete the IDP setup and service connection.
Set up attributes mapping on your IDP to match Sentinel IDP attributes:
*If your IDP uses different field names in the Attributes section, map the IDP field names to the corresponding Sentinel field names.
Save changes.
Toggle the 'SAML ON/OFF' switch after updating settings.
After a successful configuration, a new SSO Login button will appear on the login screen. Sentinel also provides a direct SSO login URL that can be used to initiate login through your IDP. This URL can be found under the Sentinel Direct Login Link.
Assign Default Access for New SSO Users
First-time users that use the single sign-on (SSO) login may be automatically given access to one or more PeopleSoft environments in Sentinel.
A Sentinel user will only receive access to environments for which they have access profiles.
Default Profiles will be assigned to all signed-up users via SAML integration.