In this section we will discuss the SAML integration of OVIO. With this section we can easily integrate our application into your current identity provider. This leads to an automatic import, user maintenance and assignment of authorizations in company-based groups / departments.

1. SAML Providers

Amazon AWS Identity

Google Identity

Microsoft Entra

OCTA

Every other provider that supports SAML 2.0.

2. SAML Requirements

This example is based on a Microsoft Entra integration.

2.1. SAML Configuration

Attribut

Wert

Identifier (Entity ID)

https://serverurl.domin.de/something

Reply URL (Assertion Consumer Service URL)

https://serverurl.domin.de/something

Logout URL 

https://serverurl.domin.de/something/something

2.2. SAML Attribute

OVIO Parameter Example Microsoft Entra
user_assignedroles user.assignedroles
user_givenname user.givenname
user_isEnabled user.accountenabled
user_language user.preferredlanguage
user_mail user.mail
user_phone user.mobilephone
user_surname user.surname
user_groups user.groups
Unique User Identifier user.userprincipalname

2.3. SAML Certificate

The support department requires a Federation Metadata XML file with an integrated certificate from you at the setup appointment. You can see an example of what this looks like here:

<?xml version=“1.0” encoding=“utf-8”?><EntityDescriptor ID=“_171ef52486” entityID=“https://sts.windows.net/” xmlns=“urn:oasis:names:tc:SAML:2.0:metadata”>

<Signature xmlns=“http://www.w3.org/2000/09/xmldsig#”>

<SignedInfo><CanonicalizationMethod Algorithm=“http://www.w3.org/2001/10/xml-exc-c14n#” />

<SignatureMethod Algorithm=“http://www.w3.org/2001/04/xmldsig-more#rsa-sha256” />

<Reference URI=“#_171ef597-486”><Transforms>

<Transform Algorithm=“http://www.w3.org/2000/09/xmldsig#enveloped-signature” />

<Transform Algorithm=“http://www.w3.org/2001/10/xml-exc-c14n#” /></Transforms>

<DigestMethod Algorithm=“http://www.w3.org/2001/04/xmlenc#sha256” />

<DigestValue></DigestValue>

</Reference></SignedInfo><SignatureValue></SignatureValue>

<KeyInfo><X509Data><X509Certificate></X509Certificate>

</X509Data></KeyInfo></Signature>

<RoleDescriptor xsi:type=“fed:SecurityTokenServiceType” protocolSupportEnumeration=“http://docs.oasis-open.org/wsfed/federation/200706” xmlns:xsi=“http://www.w3.org/2001/XMLSchema-instance” xmlns:fed=“http://docs.oasis-open.org/wsfed/federation/200706”>

<KeyDescriptor use=“signing”><KeyInfo xmlns=“http://www.w3.org/2000/09/xmldsig#”>

<X509Data><X509Certificate></X509Certificate></X509Data>

</KeyInfo></KeyDescriptor><fed:ClaimTypesOffered>

2.4. SAML Group Import

To be able to use the internal company groups, you should export the AD groups you want to import once to a .CSV file and import them into OVIO in the administration. The desired authorizations per department are then maintained here once. The user assignments are then made automatically when logging in via the SAML SSO and the group memberships are resolved and saved. This ensures that your OVIO Cloud always remains clean and free of imported “garbage” such as inactive users, Exchange mailboxes, private groups, etc.

An example of the fields OVIO expects for a group import. The separator should be a ;.

id

displayName

groupType

membershipType

source

mail

securityEnabled

mailEnabled

isAssignableToRole

onPremisesSyncEnabled