Product Update

Create Certificates to Sign SAML Requests

Carlyn Manly
2020-03-14
2 Min Read

An extra feature has become available for organizations that use the SAML protocol to give their people single sign-on access to Xurrent.ย  This new feature allows them to add an extra layer of security by ensuring that Xurrent signs the SAML request that it sends to the organizationโ€™s identity provider (e.g. Azure AD, Okta, OneLogin, Google Cloud Identity, etc.) when someone from the organization attempts to open Xurrent.

Before Xurrent can sign these SAML requests, a certificate needs to be generated.ย  Administrators can do this in the new โ€˜Certificatesโ€™ section of Xurrentโ€™s Settings console.ย  Creating a certificate is easy.ย  It only requires the administrator to select a cryptographic algorithm, a start date and an end date.

Creating a SAML signing certificate in 4me

After creating a certificate, the administrator can download its X.509 certificate.ย  This is the certificate that an organizationโ€™s identity provider can use to verify that the public key belongs to Xurrent.

Download X-509 certificate

To get Xurrent to use the new certificate to sign the SAML requests that it generates, the owner of the organizationโ€™s Xurrent account goes to the โ€˜Single Sign-Onโ€™ section of the Settings console.ย  There the account owner can select (one of) the organizationโ€™s single sign-on configuration(s) that uses the SAML protocol.ย  The certificate can then be selected in the optional Signing certificate field that has become available at the bottom of the form.

After selecting a certificate, the Signing algorithm field becomes available to allow the account owner to select an RSA signature algorithm for signing the SAML requests.

Selecting signing certificate in 4me SSO configuration