Features

SAML2 offers the following features:

  1. Allow your organization to use their corporate login to access Fliplet Studio.
  2. Fliplet admins can control who has to complete the SAML2 login.
  3. Be notified when a user outside of your SSO domain is invited.

Get Started

To set up SAML2 you’ll need to:

  1. Be an admin in Fliplet Studio
  2. Configure SAML2 Single Sign-On settings
  3. Test SAML2 Login

Step 1 – Open the Organization Dashboard

  1. Login to Fliplet Studio.
  2. In the top right corner of your device screen, click on My account and select “Manage organization”.
  3. Go to the “Security” tab.

Step 2 – Configure SAML2 Single Sign-On settings

  1. In the “Security” tab, find the SAML2 Single Sign-On option and click configure.

  2. Fill each of the visible options, starting with SAML2 information.

  3. Under Service name, enter the name of the service that you are using, for example, Google.

  4. Enter an approved domain in the next section.

  5. Once you have completed one section, you’ll see a green tick next to the section name and you can proceed to the next section.
  6. Next, click on Configure authentication.
  7. Enter the Login URL and the Identity provider certificate.
    1. These details you will get from your SAML2 provider.

  8. Click on the “Copy link to metadata XML” button to copy the XML URL.
  9. Now that SAML2 is enabled, organization admins will be sent an email notification when any external users who don’t belong to the SSO domain are invited to an app.

Step 3 – Test SAML2 Login

  1. Click on the “Test SAML2 login” button. You will be prompted to sign in to Google.

  2. Click on Sign in with Google. Then you will be prompted to choose an account.

  3. After choosing an account, you will be redirected back to Fliplet Studio. Click on Map response variables. The data from your SAML2 login will appear in the box on the left.

  4. Enter the “Variables” on the right according to the “Example” below the search bar for each variable.

  5. Click on the blue “Save” button.
  6. If the SAML2 information, Configure authentication, and Map response variables sections have been completed, click on the final section; Enforce SAML2 login.

  7. Make sure the box next to Enforce SAML2 login is checked. Enforcing SAML2 means that users will have to complete the SAML2 login according to the way it was configured in the SAML2 information section.
  8. Click on the blue “Save” button.

 

Note: There are a couple of exceptions to the SAML2 login rule who do not have to complete it as described above. Organization admins will be asked to log in to SAML2 as well, but they are not required to do so. They can type signin/?no_sso=1 into their browser’s search bar, and they will automatically be shown the password field to enter Fliplet Studio. Any other users will be required to login as usual, unless they do not have an identity in the SAML2 provider (such as contractors or external employees). In this case, in the “User” tab under “Manage organization” click on the “Edit” button across from the user that you want to allow to bypass SAML2.

Under Single Sign-On is enforced for your organization, check the box next to “Allow this user to sign in using their Fliplet password” 
Then click “Save”.

Note: Organization admins are not forced to set up their SSO. This enables the user to amend the SAML2 configuration settings.
Admins will need to manually connect their account to SSO by going to Account settings.

 

Was this article helpful?
YesNo