Hello there!

Need Help? We are right here!

Support Icon
miniOrange Email Support
success

Thanks for your Enquiry. Our team will soon reach out to you.

If you don't hear from us within 24 hours, please feel free to send a follow-up email to info@xecurify.com

Search Results:

×

Configure Rippling as SAML IDP for SSO


miniOrange Identity Broker service solution enables cross protocol authentication. You can configure Rippling as an IDP for Single Sign-On (SSO) into your applications/websites. Here, Rippling will act as an Identity Provider (IDP) and miniOrange will act as a broker.

We offer a pre-built solution for integrating with Rippling, making it easier and quick to implement. Our team can also help you set up Rippling as SAML IDP to login into your applications.


Get Free Installation Help


miniOrange offers free help through a consultation call with our System Engineers to configure SSO for different apps using Rippling as IDP in your environment with 30-day free trial.

For this, you need to just send us an email at idpsupport@xecurify.com to book a slot and we'll help you in no time.



Connect with External Source of Users


miniOrange provides user authentication from various external sources, which can be Directories (like ADFS, Microsoft Active Directory, OpenLDAP, AWS etc), Identity Providers (like Microsoft Entra ID, Okta, AWS), and many more. You can configure your existing directory/user store or add users in miniOrange.



Prerequisite:

  • To get started you need to have an active Rippling account with administrator rights for your organization.
  • Get the miniOrange SP metadata that you will require in the first step. For this, go to the miniOrange Admin Console >> Identity Providers >> Add Identity provider. Under Choose Identity Provider, select SAML from the dropdown and go to SAML Provider. Then click on the Click here link.
  • Rippling as IDP : Get metadetails to configure Rippling SAML IDP

  • Click on Show metadata Details under For SP - Initiated SSO. Keep ACS URL and Entity ID or Issuer which you will require in Rippling console in Step 1.
  • Configure Rippling Single Sign-On (SSO)


Steps to setup Rippling as an IDP and miniOrange as a Service Provider (SP) for SSO login

1. Configure miniOrange as Service Provider (SP) in Rippling

  • Login to your Rippling domain as an Account Administrator.
  • Navigate to Home >> IT Management >> Custom App from the left navigation bar.
  • Rippling Single Sign On (SSO) authentication

  • Click on Create New App button on the top right corner.
  • Rippling Single Sign On (SSO) authentication

  • Enter the Name, Select category and Upload Logo according to your application.
  • Select Single Sign-On (SAML) app type. Click on Continue.
  • Rippling Single Sign On (SSO) select saml

  • Confirm that you are the Application Admin. Click on Continue.
  • Rippling Single Sign On (SSO) select saml

  • The SSO Setup instructions page will be visible. This will include the IdP Metadata XML file. Download the XML file which will be required later for the miniOrange configuration.
  • Rippling Single Sign On (SSO) select saml

  • Click on Move To Next Step.
  • You will be asked to provide ACS URL and Entity ID. Enter the values which we got from Prerequisites.
  • Rippling Single Sign On (SSO) miniOrange Data

  • Complete the remaining setup with desired settings.

2. Configure Rippling as Identity Provider (IDP) in miniOrange

  • Go back to the miniOrange Admin console and navigate to Identity Providers in the left navigation menu. Then, click on Add Identity Provider button.
  • Rippling as IDP :  Add Identity Provider

  • In Choose Identity Provider, select SAML from the dropdown.
  • Rippling as IDP :  Select SAML from dropdown

  • Search for SAML Provider.
  • Rippling as IDP :  Search SAML

  • Click on Import IDP metadata.
  • Rippling as IDP: Select SAML and Import IDP Metadata

  • Upload the XML metadata file that you downloaded from the Rippling in Step 1 using the Import IDP Metadata feature.
  • Enter the IDP Name as Rippling, select File as the IDP Metadata format and upload the XML file.
  • Then click on the Import button.
  • Rippling as IDP : Upload Metadata File

  • Your IDP metadata details will be auto-filled.
  • Scroll to Enable for Enduser Login and enable the toggle.
  • Click on Save.

3. Test Connection

  • Visit your Login Page URL.
  • Go to Identity Providers tab.
  • Search for your app, click the three dots in the Actions menu, and select Test Connection against the Identity Provider (IDP) you configured.
  • Rippling-IDP-TestConnection

  • On entering valid Rippling credentials (credentials of user assigned to app created in Rippling), you will see a pop-up window which is shown in the below screen.
  • SucessTestConn-Rippling-IDP

  • Hence your configuration of Rippling as IDP in miniOrange is successfully completed.

Note:

You can follow this guide, if you want to configure SAML/WS-FED, OAuth/OIDC, JWT, Radius etc



Configure Attribute Mapping

  • Go to Identity Providers.
  • Click the three dots in the Actions menu, and select Attribute Mapping against the Identity Provider (IDP) you configured.
  • Rippling Single Sign-On SSO Select and Configure Attribute Mapping


Maps information, such as email and username, during Just-In-Time (JIT) user creation. Email and Username attributes are necessary to create the user profile.

  • Click on the + Add Attribute button to add the attribute fields.
  • Rippling Single Sign-On SSO Map USER Attribute

  • Check the attributes in the Test Connection window from the previous step. Choose any attribute names you want to send to your application under Attribute Name sent to SP.
  • Enter the values of the attributes coming from IdP into the Attribute Name from IdP field on the Xecurify side.

EXTERNAL mappings help alter incoming attribute names before sending them to apps, ensuring that the data is in the correct format.

  • Click on the + Add Attribute button to add the attribute fields.
  • Rippling Single Sign-On SSO Map EXTERNAL Attribute

  • Check attributes in test connection window from last step. Enter the attribute names (any name) that you want to send to your application under Attribute Name sent to SP.
  • Enter the value of attributes that are coming from IdP into the Attribute Name from IdP field on the Xecurify side.

Configure Multiple IDPs:

You can follow this guide, if you want to configure multiple IDPs (Identity Providers) and give users the option to select the IDP of their choice to authenticate with.


External References

Want To Schedule A Demo?

Request a Demo
  



Our Other Identity & Access Management Products