RedJade can be configured to provide SAML 2.0 Single Sign-On for your users. This way, they do not have to provide separate login credentials for RedJade. The authentication of the user is done by any SAML 2.0 provider you configure on your side and the user attribute Email address is sent back to RedJade.
NOTE – Users must be added in RedJade using the same email address on the Identity Provider side. Roles must also be assigned within RedJade. See Add Users and Assign Roles |
Users can leverage Single Sign-On (SSO) by adding this app to their directory. Follow the steps below for adding and configuring the app for RedJade SSO.
See also the following Google Workspace guides for further details:
To configure SSO with Google:
- Open the Google Admin Console and go to Apps>Web and Mobile Apps from the left sidebar.
- Click [Add App] and select Add custom SAML app.
- On the App Details page enter the App Name. Optionally, upload an App Icon (RedJade support can provide a logo file upon request). Click [CONTINUE].
- On the Google Identity Provider details page, choose Option 1: Download IdP metadata. Click on [DOWNLOAD METADATA] and send the metadata file by email to RedJade Support so they can complete the SSO configuration on the RedJade application side. Click [CONTINUE].
- In the Service Providers Details page, enter the ACS URL (Assertion Consumer Service URL), Entity ID, (optional) Start URL and Name ID Format. These values are all included in RedJade's metadata file and also provided as the Basic SAML Configuration details in the email from RedJade Support that initiated the SSO configuration. Click [CONTINUE].
- ACS URL (Assertion Consumer Service URL) – https://<yoursubdomain>.redjade.net/accounts/saml/auth
- Entity ID – https://<yoursubdomain>.redjade.net
- Name ID Format – select EMAIL from the drop-down list.
- Name ID – The default Name ID is the primary email and should not be changed.
NOTE – In this example the sub-domain `RJ` is used and will change specific to your company. By default RedJade Support will set <yoursubdomain> as your company name. If you have a preferred sub-domain name to be used, please provide it to RedJade Support prior to completing your configuration. - On the Attribute Mapping page, click [FINISH].
- From the RedJade SSO SAML app page that was just created, click User access.
- Change the Service Status to ON for everyone to turn on the service for everyone in your organization. Click [SAVE].
Optionally, to turn on a service for a set of users across or within organizational units, click Groups from the left sidebar and select an access group. To turn a service on or off for an organizational until, click Organizational Units and select and organizational unit. For details, go to turn on a service for a group and organizational structure. - From RedJade SSO SAML app page, click TEST SAML LOGIN to ensure users get redirected properly.
If the SSO configuration is complete on your side, you should see the following screen. RedJade will then need to complete the configuration using the Federation Metadata XML file in step 10 below. - Under the SAML Signing Certificate section, choose to DOWNLOAD METADATA.
Send the metadata file by email to RedJade Support so they can complete the SSO configuration on the RedJade application side. - Once the configuration is complete on the RedJade application side, it can be tested again to ensure users are redirected properly.
If the user is already authenticated through Google, they will be redirected to the RedJade home page:
If the user is not authenticated, they will be redirected to the Google Sign in page, where they will enter their email and Google password to sign in to RedJade: