website logo
⌘K
Getting Started
Use Cases
Secure, Passwordless Login via Standard Protocols (OIDC, SAML2)
BlokSec for MFA / 2FA
Adding Passwordless Login to your In-House / Custom Application
BlokSec yuID Authenticator App
BlokSec Admin Console
FAQ's
Integrations
Microsoft 0365
Google Workspace
Salesforce
Dropbox
CyberArk Privileged Access Manager
IBM Security Verify
Custom OIDC
Custom SAML2
BlokSec SDK Integration (iOS)
Compatibility
Dependencies
Prerequisites
SDK Usage (Initialise)
New User Registration
Authentication
Account Association
Restore/Backup
API Reference
Docs powered by archbee 
2min

Custom SAML2

BlokSec can be configured as an inbound federation identity provider leveraging SAML for your application to provide your users with secure, passwordless authentication. The following article describes the process to configure authentication for SAML.

BlokSec Admin UI

  1. Sign into BlokSec admin UI as a user with admin privileges for your tenant
  2. 2. On the main dashboard, click the Add Application drop-down and select Create Custom
  3. Complete the application details as follows and submit:
    • SSO Type: Select SAML
    • Name: Your desired application name (we will assume this is called ‘Acme App’ for the remainder of this article)
    • Logo URI: Loation of the image URL (For example : https://bloksec.io/images/appLogo.png)
    • Backgroun URI: Location of the brackground image URL (For example : https://bloksec.io/images/appLogoBackground.png)
    • Session Length: Length of the authenticated session. Default value is set to 60 minutes.
    • EntityID: https://bloksec.io
    • NameID Source:  The username format you are sending in the SAML Response. Select 'User email' or 'Account Name' based on your requirements
    • Assertion Consumer Service: The location where the SAML assertion is sent with a POST operation. This URL is required and serves as the default ACS URL value for the Service Provider (SP)
    • Single Logout Service: Specify where you want to send the sign-out response
    • Request Signed: Optional configuration to accept a signed response
    • Select Submit to save the configuration
  4. Select Download and save the X.509 Signing Certificate and / or the Metadata XML file required for your Acme App configuration



Updated 03 Mar 2023
Did this page help you?
Yes
No
UP NEXT
BlokSec SDK Integration (iOS)
Docs powered by archbee 
TABLE OF CONTENTS
BlokSec Admin UI