Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 3 Current »

Please note: Currently, this feature is only supported in the web app, and not the native MazeMap app.

MazeMap supports Single Sign On (SSO) for increased security in accessing maps. With SSO, MazeMap Views can be secured for only signed-in-user access. At the moment, we support only the SAML Identity Provider the web app. Below is the procedure for enabling SSO with SAML. MazeMap supports SAML 2.0

Information to provide to MazeMap

In order to configure SAML 2.0 with MazeMap, you need to provide MazeMap with:

  • Your IDPs Metadata as either

  • Please send the URL or XML file to your Customer Success Manager

Configuring your IdP

You'll need to configure your IdP to enable federation.

MazeMap will provide you with a CUSTOMER_ID for each domain that requires federation. Please ask your CSM to confirm the Customer ID.

The endpoint where MazeMap’s Service will receive SAML assertions issued by the Identity Provider

Accessing the service

After configuration, your maps can be accessed by going to https://use.mazemap.com?campusid={CAMPUS_ID} and using the SSO login menu.

USING OFFICE 365 AS YOUR IDENTITY PROVIDER (IDP)

Find instructions below on how to use Office365 as your IDP. 

  1. Create an Azure Active Directory Enterprise application. Login to your AAD Account

    1. Click on Enterprise applications

    2. Click on New application then Create your own application

  1. Enter your desired name for your application

  1.  Under Getting Started, select Set up single sign on then select SAML

  1. Consult the information you received from MazeMap. Given your CUSTOMER_ID fill in the following fields

    1. Identifier (Entity ID): https://auth.mazemap.com/saml2/{CUSTOMER_ID}

    2. Reply URL (Assertion Consumer Service URL): https://auth.mazemap.com/saml2/{CUSTOMER_ID}/callback?client_name={CUSTOMER_ID}SAML2

    3. Logout Url (Optional): https://auth.mazemap.com/saml2/{CUSTOMER_ID}/logout
      Note however that if this url is not set, users will not be redirected back to mazemap after single logout process.

  2. Send the metadata url in the field App Federation Metadata Url to MazeMap

Screenshot from 2023-12-11 14-30-11.png

Relay State: Set this value to the url you want to be redirected to after you test the integration with the IDP-initiated Request. For the config in the image above, one will redirect to https://use.mazemap.com after a successful integration test.

Screenshot from 2021-12-08 14-21-14.png
  1. Please send the Application ID to the CSM assigned to the project, as that needs to be included in the configuration on MazeMap’s end. In order to collect the Application ID, click on the MazeMap SSO in the list of applications under “Enterprise Applications” in the Azure Portal.

  2. You will need to add users or groups to the application you've just created. This indicated the users that are allowed to sign in with the Application

  1. Optional: Access Groups
    For Asset Visualization, if the deployment calls for SSO, it’s possible to limit access to given groups by adding the Group ID (Object ID) to the accessGroups in the ssoConfig section in customer config.
    Also, if you intend to use group-based view access, then you need to do the following in order be able to give exclusive access to certain map view to specific user groups. For this to work you’ll need to add the Group claim.

    image-20230425-092743.pngimage-20230425-093017.png
  • No labels