Dalet Flex documentation has moved!
This page is no longer actively maintained. For the latest documentation, please visit us at our new support portal: https://support.dalet.com
Security Assertion Markup Language (SAML) is an open standard for exchanging authentication and authorization data between service providers and identity providers. SAML transactions use Extensible Markup Language (XML) for standardized communications between the identity provider (IdP) and service providers (SPs). SAML allows you to log into multiple applications, using the same login credentials.
Dalet Flex has been fully tested against a number of IdPs, and details of how to configure Flex SSO using each of these is provided in the corresponding documentation sub-pages.
In addition to the above, we have also successfully performed basic validation using the following SAML IdPs for Flex.
Please contact your Dalet representative at the earliest opportunity if you intend to integrate with a different IdP. Other IdPs may work with Flex “out-of-the-box” if they are fully compliant with the SAML standards; however, in some cases, development work may be required.
If using an IdP URL for dynamic IdP metadata retrieval, rather than providing static IdP metadata XML to Flex, then the Flex Login App must be able to verify the corresponding IdP certificate. As such, this certificate must be valid, in-date, and signed by a recognised certificate authority. If the IdP uses a self-signed certificate, please contact your Dalet Flex representative for details of how to make your own self-signed certificates available to and trusted by Flex services.
The following diagram provides a high level overview of the SAML authentication flow:

SAML authentication must be configured from both sides: in the external IdP, and in Dalet Flex Core.
The configuration for each IdP varies, but in all cases:
A Single Sign-On URL is a url that an IdP calls back upon authentication success.
This takes a form like: https://{account}.{your-flex-deployment.com}/login/saml/SSO.
An audience restriction is used to identify a specific app.
Unless customised through Consul KVs, this takes the following value: urn:ooyala:flex:flex-login-app.
For authentication initiated at the IdP (rather than on Flex) this provides the default redirect destination to which
users will be routed upon successful authentication.
This could be like https://{account}.{your-flex-deployment.com} for Flex Core, or like
https://{account}.{your-flex-deployment.com}/fmp/index/ for FlexMAM.
https://{account}.{your-flex-deployment.com}/login/saml/metadata. This will download or present an XML file that
can be used to configure IdP either by either uploading SP metadata or through manual configuration.https://{account}.{your-flex-deployment.com}/login/saml/metadata/certificate. This will download or present a
.crt file.ds:X509Certificate node in downloaded XML file and copy the public key.-----BEGIN CERTIFICATE-----
MIIDUjCCAjqgAwIBAgIEUOLIQTANBgkqhkiG9w0BAQUFADBrMQswCQYDVQQGEwJGSTEQMA4GA1UE
... <truncated> ...
bHwSoBy5hLPNALaEUoa5zPDwlixwRjFQTc5XXaRpgIjy/2gsL8+Y5QRhyXnLqgO67BlLYW/GuHE=
-----END CERTIFICATE-----
If debugging SAML login issues, two extra tools will be useful:
Kibana will also contain messages for any issues. Look for messages being generated by the flex-login-app and the
flex-authentication-service in Kibana for extra information on any issues.
Prior to version 2019.7.0, each individual Flex application managed login directly, rather than through the unified Flex Login App. There are a few differences when configuring SAML on such older versions of Flex, namely:
https://review.{your-flex-deployment.com}/review/a/{account} instead of
https://{account}.{your-flex-deployment.com}/review/https://review.{your-flex-deployment.com}/review/saml/SSO and urn:ooyala:flex:flex-reviewer-app.Prior to version 2020.1.0, Flex could not be configured with static IdP metadata XML. On such older versions of Flex, a URL must be provided for dynamic IdP metadata retrieval.
Prior to version 2021.1.0, where using dynamic IdP metadata retrieval, even IdP certificates which are signed by a recognised certificate authority need to be explicitly loaded into Flex. In such cases, please contact your Dalet Flex representative as described above. The exceptions are Okta and Auth0 IdPs, which do not require this step.