SAML 2.0 Configuration for Confluent to Infisign
Step 1:
Sign in to Infisign with the Admin Login Credentials. Now in the Dashboard Screen, Click on the Application > Browse App Catalog page will direct you to the Browse App Integration Page and select Confluent.
Step 2:
Click on Confluent to proceed with the Application Integration. Once clicked and proceeded, you will be directed to the Zendesk Integration page here click the “Add Integration” button to proceed.
Step 3:
Enter the Application Label Name and select SAML then Click Next. This will direct you to the Sign-on option page.
Step 4:
Enter the ACS URL ,Entity Id and App Login URL then click Generate Xml
SAML Login URL: https://confluent.cloud/login/sso/<sso-identifier>
Step 5:
Configuring SAML in Confluent
1. Log in to Confluent:
Go to the Confluent website and log in with your admin credentials.
2. Open the Confluent Cloud Console and go to the Single sign-on page at https://confluent.cloud/settings/org/sso. You can also get to this page by opening the Administration menu and clicking Accounts & access > Single sign-on.
3. On the Single sign-on page, click Enable SSO. The Set SSO identifier page displays.
In the SSO identifier field, enter the unique SSO identifier that will be used to identify your organization. The value you enter is appended to the Single Sign-on URL, like this:
https://confluent.cloud/login/sso/<sso-identifier>
4. Enter IdP Details:
Paste the MetaData Url of infisign
[ https://app.infisign.net/saml-service/saml/{YOUR TENTANT ID}/idp/metadata/ ]
4. Get SP (Service Provider) Details:
- APPLogin URL: Confluent will provide you with the SAML login URL. This is the URL where users should go to initiate the SSO login.
https://confluent.cloud/login/sso/<sso-identifier>
- Callback URL (ACS URL): This is where Confluent expects to receive the SAML assertion from the IdP. This URL should be configured in your IdP.
https://login.confluent.io/login/callback?connection=<my-sso-identifier>
- Audience/Entity ID: This identifies the service provider (Confluent) in the SAML assertions. Make sure this matches what is configured in your IdP.
urn:auth0:confluent:<my-sso-identifier>