Links

OneLogin SSO

Set up OneLogin SSO to log in to the Panther Console

Overview

Panther supports integrating with OneLogin as a SAML provider to enable logging in to the Panther Console via SSO.
For more information on features, terminology, and limitations of SSO integrations with the Panther Console, see Identity & Access Integrations.

How to configure SAML SSO to the Panther Console with OneLogin

Obtain the OneLogin SSO parameters from Panther

  1. 1.
    Log in to the Panther Console.
  2. 2.
    Click the gear icon in the upper right. In the dropdown menu, click General.
  3. 3.
    Click the Identity & Access tab.
Keep this browser window open, as you will need the Audience and ACS URL values in the next steps.
In the General settings page in the Panther Console, the Identity & Access tab is shown. Various fields are visible, such as Enable SAML, Enforce Single Sign On, Default Role, Identity provider URL, Audience and ACS Consumer URL.

Create the OneLogin App

  1. 1.
    Log in to the OneLogin administrative console.
  2. 2.
    Click the Applications tab, then click Applications in the drop-down menu.
  3. 3.
    Click Add App in the upper right side of the page. Search for and select SAML Custom Connector (Advanced).
    Two options are shown: SAML Custom Connector (Advanced) and  SAML Custom Connector (SP Shibboleth). The former is circled in red.
  4. 4.
    Fill in the form: Note: We recommend that you disable the "visible in portal" option since SAML logins can only be initiated from Panther.
    • Display Name: Add a descriptive name, such as "Panther Console."
    • Logo Icon: Upload a Panther logo to help users quickly identify this app.
    • Description: Add a description of the app.
  5. 5.
    Click Save.
  6. 6.
    Open your new app's "Configuration" page. Under "Application Details," enter the following:
    • Audience: Enter the Audience you copied from the Panther Console in earlier steps of this documentation.
    • Recipient: Enter the ACS URL you copied from the Panther Console in earlier steps of this documentation.
    • ACS (Consumer) URL Validator: Enter the ACS URL you copied from the Panther Console in earlier steps of this documentation.
    • ACS (Consumer) URL: Enter the ACS URL you copied from the Panther Console in earlier steps of this documentation.
  7. 7.
    In the Parameters tab, add the attribute mappings for Panther. Check the box next to "Include in SAML assertion" for each attribute.
    • PantherFirstName: First Name
    • PantherLastName: Last Name
    • PantherEmail: Email When you are done, they will appear in the attributes list:
      The parameters list from the OneLogin admin console is displayed. There is a red square outlining the Panther attributes.
  8. 8.
    Click Save.
  9. 9.
    In the SSO tab, set the algorithm to SHA-512.
  10. 10.
    Copy the Issuer URL and store it in a secure location. You will need this in the next steps.
    The image shows the OneLogin admin console. On on the left sidebar, SSO is selected. In the center of the page, the SAML 2.0 settings are displayed.
  11. 11.
    Save your settings.
After you're done, make sure to grant access to the appropriate users and groups.

Configure OneLogin SAML in Panther

  1. 1.
    Navigate back to the SAML configuration you started earlier in this documentation.
  2. 2.
    Next to Enable SAML, set the toggle to ON.
  3. 3.
    In the Default Role field, choose the Panther role that your new users will be assigned by default when they first log in via SSO.
  4. 4.
    In the Identity Provider URL field, paste the Issuer URL from OneLogin that you obtained in the previous steps of this documentation.
  5. 5.
    Click Save Changes.
To test your setup, go to your Panther sign-in page and click Login with SSO.
The Panther login page displays a "Login with SSO" button at the bottom.