Skip to main content

Integration with Auth0

note

Information required for this integration may be provided by both Zeenea and the Customer.

See Auth0 documentation for more information.

SAML

Zeenea Credentials

As an alternative, you can use the following link for configuration purposes. It will let you download the metadata.xml configuration file to setup your Identity Provider:

https://login.prod.zeenea.app/samlp/metadata?connection=CONNECTION

note

In the example above, “CONNECTION” refers to the name of your Zeenea instance. This connection MUST have been created before requesting this resource otherwise, the metadata file won't be accessible.

Customer Credentials

FieldOwnerDescription
Connection NameZeeneaName of the connection, set up by Zeenea. It represents your instance.
Display NameThe customer may suggest this.Display name of the login button (optional)
Logo URLThe customer may suggest this.Logo that will be displayed on the login button (optional). Dimensions: 20px x 20px.
IdP domainsCustomer.

Required if there are multiple domains.
All domains, separated by a comma.
Sign in URLCustomer.

Required. Must be given to Zeenea.
Unique login URL for SAML
X.509 CertificateCustomer.

Required. Must be given to Zeenea.
Certificate (provided by the customer) to be uploaded.
Sign Out URLCustomer.

Required. Must be given to Zeenea.
Unique logout URL for SAML
User ID AttributeCustomer.

Optional: only required if the mapping is not standard.
Optional: to be mapped with Auth0’s “user_id” value
Debug ModeZeeneaTo be toggled on or off
Sign RequestCustomer.

Should the request be signed?
When enabled, the SAML authentication request will be signed. Zeenea will then provide the customer with a decrypting certificate (1).
Sign AlgorithmCustomer.

SHA256 or SHA1
Algorithm used by Auth0
Sign Digest AlgorithmCustomer.

Algorithm used by Auth0 for the digest
Algorithm used by Auth0 for the digest
Protocol BindingCustomer.

Algorithm used by Auth0 for the digest
Binding HTTP to use with the IdP

The signature of the assertions/tokens that prove the identity of a given end-user account managed by Auth0 relies on a self-signed certificate, of type x.509 v3, key size 2048 bits, created by Auth0, and not a certificate issued by a certification authority. This does not pose any security problem, because the trust relationship between the issuer of the assertions/tokens (Auth0) and the consumer (Zeenea's client) is manually configured. In addition, the self-signed certificate provided by Auth0 has a long lifetime (current certificate expires at the end of 2033), so from a lifetime perspective, there will be no need to frequently change the certificate.

Finally, you explicitly configure your IdP to trust the identity of users from this specific Auth0 certificate that you obtained from Zeenea and that was manually provided to you. So this trust happens to be based on a certificate, but the fact that this certificate is issued by a certificate authority would not add anything in terms of trust relationship.

The SAML response sent by the IdP to Auth0 must contain the email in one of the attributes. By default, the email is expected in an attribute named: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress

It can also be defined as an identifier in an attribute named: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameidentifier

In any case, the attribute containing the email must be communicated to Zeenea; this will allow us to correct the setup (if needed), and to make sure that the information is correctly retrieved.

SAML Response Example:

http://www.w3.org/2000/09/xmldsig#"" xmlns:saml="urn:oasis:names:tc:SAML:2.0:assertion">
[...]
IssueInstant="2021-01-01T00:00:00Z" Version="2.0">
[...]

[...]

http://www.w3.org/2001/XMLSchema"" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
xsi:type="xs:string">email@domain.com

[...]

For more information on this integration, make sure to check out the official documentation: https://auth0.com/docs/connections/enterprise/saml

Active Directory

Information regarding this integration is available on the official Auth0 website: https://auth0.com/docs/connections/enterprise/azure-active-directory/v2

ADFS

Information regarding this integration is available on the official Auth0 website:

https://auth0.com/docs/connections/enterprise/adfs

Parameters you should fill in Active Directory are:

GSUITE

Information regarding this integration is available on the official Auth0 website.

Database

This kind of connection does not require any information from your end. It is set up entirely by Zeenea.