Create Certificates to Sign SAML Requests
An extra feature has become available for organizations that use the SAML protocol to give their people single sign-on access to Xurrent.Ā This new feature allows them to add an extra layer of security by ensuring that Xurrent signs the SAML request that it sends to the organizationās identity provider (e.g. Azure AD, Okta, OneLogin, Google Cloud Identity, etc.) when someone from the organization attempts to open Xurrent.
Before Xurrent can sign these SAML requests, a certificate needs to be generated.Ā Administrators can do this in the new āCertificatesā section of Xurrentās Settings console.Ā Creating a certificate is easy.Ā It only requires the administrator to select a cryptographic algorithm, a start date and an end date.

After creating a certificate, the administrator can download its X.509 certificate.Ā This is the certificate that an organizationās identity provider can use to verify that the public key belongs to Xurrent.

To get Xurrent to use the new certificate to sign the SAML requests that it generates, the owner of the organizationās Xurrent account goes to the āSingle Sign-Onā section of the Settings console.Ā There the account owner can select (one of) the organizationās single sign-on configuration(s) that uses the SAML protocol.Ā The certificate can then be selected in the optional Signing certificate field that has become available at the bottom of the form.
After selecting a certificate, the Signing algorithm field becomes available to allow the account owner to select an RSA signature algorithm for signing the SAML requests.
