Prior to configuring your Identity Provider, please be sure to, initially, create the authentication provider in Ruddr via Workspace Settings. Once the authentication provider has been created, the Entity ID and Assertion Consumer Service URL (ACS URL) referred to in the below steps will be available.
There are three providers that can be setup for Ruddr:
Follow the steps below to configure your preferred Identity Provider.
Microsoft Entra ID
- Login to Microsoft Entra ID with an administrator account.
- Create the Ruddr application.
- Go to “Identity → Applications → Enterprise Applications”.
- Select “New application”.
- Select “Create your own application”.
- Type “Ruddr” as the app name.
- Select “Integrate any other application you don’t find in the gallery (Non-gallery)”.
- Setup Single-Sign On.
- Select “Single sign-on”.
- Select “SAML”.
- Edit the “Basic SAML Configuration”.
- Set the “Identifier (Entity ID)”.
- Click “Add identifier”.
- Copy the “Entity ID” from Ruddr. The Entity ID will be available via the SAML Settings that were created with the authentication provider you setup in workspace settings.
- Paste the value into the input.
- Set the “Reply URL (Assertion Consumer Service URL)”.
- Click “Add reply URL”.
- Copy the “Assertion Consumer Service URL” from Ruddr. This ACS URL will be available via the SAML Settings that were created for the Microsoft Entra ID authentication provider in workspace settings.
- Paste the value into the input.
- Save and Close the “Basic SAML Configuration” editor.
- Download the Metadata XML.
- Locate the “SAML Certificates” section.
- Dowload the “Federation Metadata XML”.
- Upload this file to the auth provider in Ruddr to complete the configuration.
- Assign Microsoft Entra ID Users to this application.
- Finish the setup on Ruddr (Service Provider).
- (Optional) Test single sign-on from within Microsoft Entra ID.
- (Optional) Verify that Ruddr appears in https://myapps.microsoft.com/.
Google Workspace
- Login to Google Workspace with an administrator account.
- Create the Ruddr application.
- Go to “Apps → Web and Mobile Apps”.
- Select “Add App → Add custom SAML app”.
- Type “Ruddr” as the app name.
- Click “Continue”.
- Google Identity Provider Details
- Click “Download Metadata”.
- Upload this file to the auth provider in Ruddr to complete the configuration.
- Click “Continue”.
- Service Provider Details
- Set the “ACS URL”.
- Copy the “Assertion Consumer Service URL” from Ruddr. This ACS URL will be available via the SAML Settings that were created for the Google Workspace authentication provider in workspace settings.
- Paste the value into the input.
- Set the “Entity ID”.
- Copy the “Entity ID” from Ruddr. The Entity ID will be available via the SAML Settings that were created with the authentication provider you setup in workspace settings.
- Paste the value into the input.
- Click “Continue”.
- Set the “ACS URL”.
- Attribute Mapping
- Click “Finish”.
- Assign Google users to this application.
- Finish the setup on Ruddr (Service Provider).
- (Optional) Use the “Test SAML Login” button.
Okta
- Login to Okta with an administrator account.
- Create the Ruddr application.
- Go to “Applications → Applications”.
- Select “Create App Integration”.
- Select “SAML 2.0”.
- Type “Ruddr” as the app name.
- Click “Continue”.
- Configure SAML
- Set the “Single sign-on URL”.
- Copy the “Assertion Consumer Service URL” from Ruddr. This ACS URL will be available via the SAML Settings that were created for the Okta authentication provider in workspace settings.
- Paste the value into the input.
- Set the “Audience URI (SP Entity ID)”.
- Copy the “Entity ID” from Ruddr. The Entity ID will be available via the SAML Settings that were created with the authentication provider you setup in workspace settings.
- Paste the value into the input.
- (Optional) Edit the “Application username”.
- This should be the field that maps to the member’s email in Ruddr.
- Click “Next”.
- Set the “Single sign-on URL”.
- Feedback
- Click “Finish”.
- Download the Metadata XML.
- Locate the “Metadata details → Metadata URL”.
- Copy the value and open it in a new browser window.
- Download the file.
- Upload this file to the auth provider in Ruddr to complete the configuration.
- Assign Okta users to this application.
- Finish the setup on Ruddr (Service Provider).
- (Optional) Use the “Test SAML Login” button.
In addition to configuring the Identity Provider, you also need to configure the Service Provider.