This option allows you select either
Microsoft (Azure) or
SAML based login for viewers.
When you use this, you have three options:
Public - all people with valid (google or azure based on your selection) accounts are allowed to access your deployment.)
Filter By domain - all people with valid google or azure based accounts on the domain that you have set are allowed to access your deployment.
Filter By viewer list - all accounts google or azure based accounts in your viewer list are allowed to access your deployment.
This is a viewer group authentication mechanisms support for the Security Assertion Markup Language.
Any SAML identity provider (IdP) can be configured to be used for authentication of a viewer.
To enable this, head over to the
Viewer Group page, then:
- Select SSO as your
- Now select
- After this, you will be asked to provide your SAML IdP configuration.
You should see the config as follows:
- Enter your IdP's
SSO redicrection URLand
X.509 signing certificate.
- Click the
Savebutton to finally save your configuration.
- To register GMetri as a service provider (SP) with your IdP, you will need the configuration details. You can get these details by clicking the
Download GMetri's SAML Metadatabutton.
You can find sample metadata configuration here under the
SAMLtest's IdP section. This will give you an idea of what you need to paste in the boxes for the SAML config.
NOTE on pasting X.509 certificate
Please paste certificate without the
----BEGIN CERTIFICATE---- and
----END CERTIFICATE---- part.
Once you create a SAML viewer group, head to your deployment and set this viewer group as the authentication mechanism for that deployment.
- Once you open a viewer link for deployment with a SAML SSO based viewer group, you will see a pop-up with the IdP's login page.
- Post-IdP login process, you will be redirected back to
- We use your
email addresssent to us by the
IdPas the primary identifier for the viewer session.
- Name Identifier format:
- In IdP
SAMLResponsewe look for the following attributes:
SAML authentication will not be successful unless the
IdP returns your