Kinesis SSO configuration
Ria Noche avatar
Written by Ria Noche
Updated over a week ago

Kinesis provides support for SSO to customers on request. All Kinesis SSO configurations are based on standard protocols and approaches, and utilise a Service Provider (SP) initiated approach.

sso.png

Kinesis will automatically provision users via your SSO connection, but all role and subsequent administration is in-application. Kinesis regularly re-authenticates and any decommissioned uses will lose the ability to authenticate with Kinesis.

Kinesis partners with Auth0 to provide SSO connections and will support any of there Enterprise connection options, however the most common connections are:

  • Google Workspace

  • SAML

  • Azure Active Directory

Google Workspace Configuration Requirements

Kinesis will provide you with the following to configure your systems:

  • Our authentication domain

  • Our redirect URI

You will need to configure an App and provide Kinesis with:

  • A client id: Unique identifier for your registered Azure AD application. Enter the saved value of the Application (client) ID for the app you just registered in Azure AD.

  • A client secret: String used to gain access to your registered Azure AD application. Enter the saved value of the Client secret for the app you just registered in Azure AD.

  • Google Workspace Domain: Google Workspace domain name for your organization.

SAML Configuration Requirements

The Security Assertion Markup Language (SAML) protocol is an open-standard, XML-based framework for authentication and authorization between two entities without a password:

  • Service provider (SP) agrees to trust the identity provider to authenticate users.

  • Identity provider (IdP) authenticates users and provides to service providers an authentication assertion that indicates a user has been authenticated.

Kinesis uses SAML for SP initiated SSO. In order to configure A SAML connection:

Kinesis will provide you with:

  • The key for verifying our signed requests to your identity provider.

  • Assertion Consumer Service URL, which will be:

    • https://kinesis.au.auth0.com/login/callback?connection=YOUR_ORGANISATION_CODE

  • Entity ID:

    • urn:auth0:kinesis:YOUR_ORGANISATION_CODE

  • Our request mechanism:

    • Protocol Binding: Signed HTTP-POST requests

    • Signed Request Algorithm: RSA-SHA256 (RSA-SHA1 available on request)

    • Signed Request Algorithm Digest: SHA256 (SHA1 available on request)

  • Kinesis can provide an SAML metadata link for import, but only after the below sign-in URL and signing certificates have been provided.

You will need to provide Kinesis with:

  • Sign In URL: Enter the Sign In URL that you obtained from the IdP.

  • X509 Signing Certificate: Provide the X509 Signing Certificate file (in .pem or .cer format) that you obtained from the IdP.

The following attributes are used:

  • name

  • email

  • given_name

  • family_name

Kinesis can map these from your attributes on request.

Azure Active Directory Configuration Requirements

Azure Active Directory configuration uses OpenID Connect (OIDC), if you would like to use SAML for connecting to Azure Active Directory, see the SAML configuration requirements.

Kinesis will provide you with:

  • Our Redirect URI

You will need to configure an App and provide Kinesis with:

  • A client id: Unique identifier for your registered Azure AD application. Enter the saved value of the Application (client) ID for the app you just registered in Azure AD.

  • A client secret: String used to gain access to your registered Azure AD application. Enter the saved value of the Client secret for the app you just registered in Azure AD.

  • Microsoft Azure AD Domain: Your Azure AD domain name. You can find this on your Azure AD directory's overview page in the Microsoft Azure portal.

SSO Configuration Process

Kinesis manages all SSO configuration internally, you will be requested to provide your email domain, and the appropriate keys and URLs depending on your configuration. Kinesis will configure the system to support this, and notify when you can test the configuration. You are able to use Kinesis managed users to test the system whilst this configuation is being made if immediate access is required.

Did this answer your question?