OneLogin SSO

Set up OneLogin SSO to log in to the Panther Console


Panther supports integrating with OneLogin as a SAML provider to enable logging in to the Panther Console via SSO.
For more information on features, terminology, and limitations of SSO integrations with the Panther Console, see SAML/SSO Integration.

How to configure SAML SSO to the Panther Console with OneLogin

Obtain the OneLogin SSO parameters from Panther

  1. 1.
    Log in to the Panther Console.
  2. 2.
    Click the gear icon in the upper right. In the dropdown menu, click General.
  3. 3.
    Click the SAML Configuration tab.
Keep this browser window open, as you will need the Audience and ACS URL values in the next steps.
The General Settings page in Panther is open to the SAML Configuration tab, which displays the Audience and ACS URL fields.

Create the OneLogin App

  1. 1.
    Log in to the OneLogin administrative console.
  2. 2.
    Click the Applications tab, then click Applications in the drop-down menu.
  3. 3.
    Click Add App in the upper right side of the page. Search for and select "SAML Test Connector (Advanced)."
    In the image, the app options listed in OneLogin admin console are displayed. The SAML Test Connector option is circled.
  4. 4.
    Fill in the form: Note: We recommend that you disable the "visible in portal" option since SAML logins can only be initiated from Panther.
    • Display Name: Add a descriptive name, such as "Panther Console."
    • Logo Icon: Upload a Panther logo to help users quickly identify this app.
    • Description: Add a description of the app.
  5. 5.
    Click Save.
  6. 6.
    Open your new app's "Configuration" page. Under "Application Details," enter the following:
    • Audience: Enter the Audience you copied from the Panther Console in earlier steps of this documentation.
    • ACS (Consumer) URL Validator: Enter the ACS URL you copied from the Panther Console in earlier steps of this documentation.
    • ACS (Consumer) URL: Enter the ACS URL you copied from the Panther Console in earlier steps of this documentation.
  7. 7.
    In the Parameters tab, add the attribute mappings for Panther. Check the box next to "Include in SAML assertion" for each attribute.
    • PantherFirstName: First Name
    • PantherLastName: Last Name
    • PantherEmail: Email When you are done, they will appear in the attributes list:
      The parameters list from the OneLogin admin console is displayed. There is a red square outlining the Panther attributes.
  8. 8.
    Click Save.
  9. 9.
    In the SSO tab, set the algorithm to SHA-512.
  10. 10.
    Copy the Issuer URL and store it in a secure location. You will need this in the next steps.
    The image shows the OneLogin admin console. On on the left sidebar, SSO is selected. In the center of the page, the SAML 2.0 settings are displayed.
  11. 11.
    Save your settings.
After you're done, make sure to grant access to the appropriate users and groups.

Configure OneLogin SAML in Panther

  1. 1.
    Navigate back to the SAML configuration you started earlier in this documentation.
  2. 2.
    Next to Enable SAML, set the toggle to ON.
  3. 3.
    In the Default Role field, choose the Panther role that your new users will be assigned by default when they first log in via SSO.
  4. 4.
    In the Identity Provider URL field, paste the Issuer URL from OneLogin that you obtained in the previous steps of this documentation.
  5. 5.
    Click Save Changes.
To test your setup, go to your Panther sign-in page and click Login with SSO.
The Panther login page displays a "Login with SSO" button at the bottom.
Last modified 1mo ago