Skip to main content
Matrix42 Self-Service Help Center

Identity Provider Integration III: Configure Silverback

Import Metadata 

  • Open your Silverback Management Console
  • Login as Administrator 
  • Navigate to Admin
  • Navigate to Authentication Provider
  • Click Import from URL
  • Paste your fetched Federation Metadata URL
  • Click OK
  • Click OK to save these changes
  • Click OK to confirm

Configure Authentication Provider 

  • Enable Show on Login Page
  • Disable classic sign-in (optional)
  • Enable Dynamic User Creation
    • Silverback will create for each login a local user account for verification reasons
    • Use your Identity Provider as access control mechanism
  • Change the Title of your SAML2 Button, e.g MyWorkspace or Azure Active Directory
  • Change the Icon 
  • Change the Color
  • Click Save 

Try a Login

  • Open your Browser in Incognito Mode
  • Open Self Service Portal 
  • Check the SAML2 button appearance
  • Click the SAML2 button
  • You will be redirected to your Identity Provider
  • Login with your credentials
  • When everything went right, you should be logged it into Self Service Portal
  • Take a device and perform an enrollment

Identities

  • Navigate back to your Silverback Management Console
  • Navigate to Users
  • You should see now a new Username with your Identity Provider E-Mail and Username information

SAML2 Admin Account

  • Navigate to Admin
  • Navigate to User Management
  • Click New System User
  • Enter a username 
  • Enter as Email the E-mail used for your Idenity Provider (e.g. tim.tober@imagoverum.com)
  • Create any password you like
    • Ensure to meet minimum requirements

Type whatever you want, the authentication will be done through the Identity Provider

  • Select Role
  • Select Language
  • Click Save

Try a Login

  • Open your Browser in Incognito Mode
  • Open Silverback Management Console
  • Click the SAML2 Button
  • You will be redirected to your Identity Provider
  • Login with your Credentials
  • When everything went right, you should be logged it into Silverback Management Console

Next Steps

Settings Overview

Settings

Option Description
Show on Login Page  With this checkbox a second button appears on each login page. Configuration of the button takes place in the Authentication Provider Button Settings area on this site.
Disable classic sign-in Hide classic sign-in login page. Users will only be able to use SAML Authentication
Service Provider Contains the unique identifier of the service provider (Silverback) and will be filled automatically when you import the Metadata URL or file.
X.509 Certificate Thumbprint Contains the certificate thumbprint for signing the payload and the assertion. This field will be filled automatically when you import the Metadata URL or file.
Identity Provider Contains the unique identifier of your identity provider (e.g. MyWorkspace, Azure Active Directory or Ping Identity). This field will be filled automatically when you import the Metadata URL or file.
Saml SSO Redirect URL This is the URL where Silverback will send the SAML2 requests. This field will be filled automatically when you import the Metadata URL or file. 
Saml SLO Redirect URL This is the URL where Silverback will send the SAML2 Logout requests. This field will be filled automatically when you import the Metadata URL or file.
Dynamic User Creation By Enabling User Creation Silverback will create for each SAML2-based login a local user account. This enables you to configure all authorized users within your Identity Provider.
Title Defines the text content of the additional button on Administrator and Self Service Portal Login
Icon Defines the icon which will be shown left of the Title. Supported file types are *.jpg, *.png and *gif
Color Defines the background color. It enables you to easily pick a basic or configure a custom color.  

Appearance

Without configured SAML2 Authentication With configured SAML2 Authentication
18.0.1_05.png 18.0.1_06.png

Import 

18.0.1_07.png With the Import from URL button you can fetch easily your SAML2 configuration from your Identity Provider via URL.
18.0.1_08.png With the Import SAML Metadata file button you will be able to upload the settings if you have a Metadata file in XML format from your Identity Provider.
  • Was this article helpful?