<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Managed Solr Security Archives - SearchStax Docs</title>
	<atom:link href="https://demo.searchstax.com/docs/category/managed-solr/mloud-manager/searchstax-security/feed/" rel="self" type="application/rss+xml" />
	<link></link>
	<description>Documentation</description>
	<lastBuildDate>Tue, 03 Jun 2025 08:20:28 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.1</generator>

<image>
	<url>https://demo.searchstax.com/docs/wp-content/uploads/2023/10/cropped-favicon-32x32.png</url>
	<title>Managed Solr Security Archives - SearchStax Docs</title>
	<link></link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Managed Search Security Overview</title>
		<link>https://demo.searchstax.com/docs/solr-security-overview/</link>
					<comments>https://demo.searchstax.com/docs/solr-security-overview/#respond</comments>
		
		<dc:creator><![CDATA[Tom Humbarger]]></dc:creator>
		<pubDate>Wed, 10 May 2023 16:48:53 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Cloud]]></category>
		<guid isPermaLink="false">https://demo.searchstax.com/docs/?p=15201</guid>

					<description><![CDATA[<p>Managed Search Security Overview The SearchStax Managed Search service automatically secures your Solr search infrastructure with built-in industry-standard security measures at the cluster, network and dashboard levels. Learn more about&#8230; <a class="more-link" href="https://demo.searchstax.com/docs/solr-security-overview/">Continue reading <span class="screen-reader-text">Managed Search Security Overview</span></a></p>
<p>The post <a href="https://demo.searchstax.com/docs/solr-security-overview/">Managed Search Security Overview</a> appeared first on <a href="https://demo.searchstax.com/docs">SearchStax Docs</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<h1 class="wp-block-heading" id="h-managed-search-security-overview">Managed Search Security Overview</h1>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<p>The SearchStax Managed Search service automatically secures your Solr search infrastructure with built-in industry-standard security measures at the cluster, network and dashboard levels.</p>



<p>Learn more about securing your Solr deployment:</p>



<ul class="wp-block-list">
<li><a href="https://demo.searchstax.com/docs/searchstax-cloud-change-your-password/">Change your password</a></li>



<li><a href="https://demo.searchstax.com/docs/searchstax-cloud-two-factor-authentication/">Two-Factor Authentication</a></li>



<li><a href="https://demo.searchstax.com/docs/single-sign-on-okta/">Single Sign-on &#8211; Okta</a></li>



<li><a href="https://demo.searchstax.com/docs/single-sign-on-onelogin/">Single Sign-on &#8211; OneLogin</a></li>



<li><a href="https://demo.searchstax.com/docs/single-sign-on-pingfederate-2/">Single Sign-on &#8211; PingFederate</a></li>



<li><a href="https://demo.searchstax.com/docs/searchstax-cloud-single-sign-on/">Single Sign-on &#8211; Azure</a></li>



<li><a href="https://demo.searchstax.com/docs/searchstax-cloud-deployment-security/">Securing Solr Deployments</a></li>
</ul>



<div class="wp-block-group"><div class="wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained">
<h2 class="wp-block-heading" id="questions">Questions?</h2>



<p>Do not hesitate to contact the <a href="mailto:support@demo.searchstax.com?subject=Solr Security Overview" target="_blank" rel="noreferrer noopener">SearchStax Support Desk</a>.</p>
</div></div>
<p>The post <a href="https://demo.searchstax.com/docs/solr-security-overview/">Managed Search Security Overview</a> appeared first on <a href="https://demo.searchstax.com/docs">SearchStax Docs</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://demo.searchstax.com/docs/solr-security-overview/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Change Your Password</title>
		<link>https://demo.searchstax.com/docs/searchstax-cloud-change-your-password/</link>
					<comments>https://demo.searchstax.com/docs/searchstax-cloud-change-your-password/#respond</comments>
		
		<dc:creator><![CDATA[Bruce]]></dc:creator>
		<pubDate>Thu, 29 Apr 2021 16:48:14 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Cloud]]></category>
		<guid isPermaLink="false">https://demo.searchstax.com/docs/?p=8799</guid>

					<description><![CDATA[<p>Change Your Managed Search Password There are multiple ways to change a password in the SearchStax Managed Search service depending on context. If you are locked out of your Managed&#8230; <a class="more-link" href="https://demo.searchstax.com/docs/searchstax-cloud-change-your-password/">Continue reading <span class="screen-reader-text">Change Your Password</span></a></p>
<p>The post <a href="https://demo.searchstax.com/docs/searchstax-cloud-change-your-password/">Change Your Password</a> appeared first on <a href="https://demo.searchstax.com/docs">SearchStax Docs</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<h1 class="wp-block-heading" id="h-change-your-managed-search-password">Change Your Managed Search Password</h1>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<p>There are multiple ways to change a password in the SearchStax Managed Search service depending on context.</p>



<p>If you are locked out of your Managed Search account, use the <a href="/docs/searchstax-cloud-deployment-security/#solr-basic-authentication">password reset</a> link on the login page.</p>



<figure class="wp-block-image size-full"><img fetchpriority="high" decoding="async" width="1015" height="654" src="https://demo.searchstax.com/docs/wp-content/uploads/2024/06/image-20.png" alt="" class="wp-image-18936" srcset="https://demo.searchstax.com/docs/wp-content/uploads/2024/06/image-20.png 1015w, https://demo.searchstax.com/docs/wp-content/uploads/2024/06/image-20-300x193.png 300w, https://demo.searchstax.com/docs/wp-content/uploads/2024/06/image-20-768x495.png 768w" sizes="(max-width: 1015px) 100vw, 1015px" /></figure>



<p>If you are logged in to Managed Search, but need to change your password because it is about to expire, navigate to the <strong>User Preferences > Password</strong> page.</p>



<figure class="wp-block-image size-large"><img decoding="async" width="1024" height="428" src="https://demo.searchstax.com/docs/wp-content/uploads/2024/06/image-21-1024x428.png" alt="" class="wp-image-18938" srcset="https://demo.searchstax.com/docs/wp-content/uploads/2024/06/image-21-1024x428.png 1024w, https://demo.searchstax.com/docs/wp-content/uploads/2024/06/image-21-300x125.png 300w, https://demo.searchstax.com/docs/wp-content/uploads/2024/06/image-21-768x321.png 768w, https://demo.searchstax.com/docs/wp-content/uploads/2024/06/image-21.png 1200w" sizes="(max-width: 1024px) 100vw, 1024px" /></figure>



<p>Users and passwords associated with the <a href="/docs/searchstax-cloud-basic-auth-api/">Solr Basic Auth</a> feature can be managed from within Managed Search. Visit the Deployment Details page and open the <strong>Security > Auth</strong> page. The Managed Search admin can edit the Solr users and passwords from there.</p>



<figure class="wp-block-image size-large"><img decoding="async" width="1024" height="505" src="https://demo.searchstax.com/docs/wp-content/uploads/2024/06/image-22-1024x505.png" alt="" class="wp-image-18940" srcset="https://demo.searchstax.com/docs/wp-content/uploads/2024/06/image-22-1024x505.png 1024w, https://demo.searchstax.com/docs/wp-content/uploads/2024/06/image-22-300x148.png 300w, https://demo.searchstax.com/docs/wp-content/uploads/2024/06/image-22-768x379.png 768w, https://demo.searchstax.com/docs/wp-content/uploads/2024/06/image-22.png 1200w" sizes="(max-width: 1024px) 100vw, 1024px" /></figure>



<p>As a footnote, it is also possible to set Solr Basic Auth passwords procedurally from the <a href="/docs/searchstax-cloud-basic-auth-api/">Searchstax Provisioning API</a>.</p>



<div class="wp-block-group"><div class="wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained">
<h2 class="wp-block-heading" id="questions">Questions?</h2>



<p>Do not hesitate to contact the <a href="mailto:support@demo.searchstax.com?subject=Change%20Your%20Password%20in%20SearchStax%20Cloud" target="_blank" rel="noreferrer noopener">SearchStax Support Desk</a>.</p>
</div></div>
<p>The post <a href="https://demo.searchstax.com/docs/searchstax-cloud-change-your-password/">Change Your Password</a> appeared first on <a href="https://demo.searchstax.com/docs">SearchStax Docs</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://demo.searchstax.com/docs/searchstax-cloud-change-your-password/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Two-Factor Authentication</title>
		<link>https://demo.searchstax.com/docs/searchstax-cloud-two-factor-authentication/</link>
					<comments>https://demo.searchstax.com/docs/searchstax-cloud-two-factor-authentication/#respond</comments>
		
		<dc:creator><![CDATA[Bruce]]></dc:creator>
		<pubDate>Thu, 29 Apr 2021 17:11:01 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Cloud]]></category>
		<guid isPermaLink="false">https://demo.searchstax.com/docs/?p=8802</guid>

					<description><![CDATA[<p>Managed Search Two-Factor Authentication All SearchStax Managed Search service users have the option of enabling Two-Factor Authentication (2FA) using the Google Authenticator. Navigate to the User Preferences > Two-Factor Authentication&#8230; <a class="more-link" href="https://demo.searchstax.com/docs/searchstax-cloud-two-factor-authentication/">Continue reading <span class="screen-reader-text">Two-Factor Authentication</span></a></p>
<p>The post <a href="https://demo.searchstax.com/docs/searchstax-cloud-two-factor-authentication/">Two-Factor Authentication</a> appeared first on <a href="https://demo.searchstax.com/docs">SearchStax Docs</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<h1 class="wp-block-heading has-text-align-left" id="h-managed-search-two-factor-authentication">Managed Search Two-Factor Authentication</h1>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<p>All SearchStax Managed Search service users have the option of enabling Two-Factor Authentication (2FA) using the <a href="https://en.wikipedia.org/wiki/Google_Authenticator" target="_blank" rel="noreferrer noopener">Google Authenticator</a>. Navigate to the <strong>User Preferences > Two-Factor Authentication</strong> tab.</p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="454" src="https://demo.searchstax.com/docs/wp-content/uploads/2024/06/image-23-1024x454.png" alt="" class="wp-image-18942" srcset="https://demo.searchstax.com/docs/wp-content/uploads/2024/06/image-23-1024x454.png 1024w, https://demo.searchstax.com/docs/wp-content/uploads/2024/06/image-23-300x133.png 300w, https://demo.searchstax.com/docs/wp-content/uploads/2024/06/image-23-768x340.png 768w, https://demo.searchstax.com/docs/wp-content/uploads/2024/06/image-23.png 1200w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>



<p>The setup procedure is simple. Click the <strong>Set Up Google Authenticator</strong> button to generate the <a href="https://en.wikipedia.org/wiki/QR_code" target="_blank" rel="noreferrer noopener">QR code</a> on this screen:</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="684" height="612" src="https://demo.searchstax.com/docs/wp-content/uploads/2022/01/image-30.png" alt="SearchStax Two-Factor Authentication" class="wp-image-10543" srcset="https://demo.searchstax.com/docs/wp-content/uploads/2022/01/image-30.png 684w, https://demo.searchstax.com/docs/wp-content/uploads/2022/01/image-30-300x268.png 300w" sizes="auto, (max-width: 684px) 100vw, 684px" /></figure>



<p>Install the Google Authenticator app on your phone or tablet and use it to scan the QR code. Once the link to SearchStax is verified (which is almost instantaneous), the phone app begins to display six-digit numbers.</p>



<p>When you log into Managed Search, enter your email address and strong password as usual. Managed Search will open a field for your six-digit code. This code changes once each minute, so it is a very secure way to authenticate.</p>



<p>Note that Managed Search displays a screen of Backup Verification Codes that you can use if you lose your phone. We recommend that you store these codes in a safe place that isn&#8217;t on your phone.</p>



<p>You can also deactivate Two-Factor Authentication from the same <strong>User Preferences</strong> screen. </p>



<div class="wp-block-group"><div class="wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained">
<h2 class="wp-block-heading" id="questions">Questions?</h2>



<p>Do not hesitate to contact the <a href="mailto:support@demo.searchstax.com?subject=SearchStax%20Cloud%20Two-Factor%20Authentication" target="_blank" rel="noreferrer noopener">SearchStax Support Desk</a>.</p>
</div></div>
<p>The post <a href="https://demo.searchstax.com/docs/searchstax-cloud-two-factor-authentication/">Two-Factor Authentication</a> appeared first on <a href="https://demo.searchstax.com/docs">SearchStax Docs</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://demo.searchstax.com/docs/searchstax-cloud-two-factor-authentication/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Single Sign-On &#8211; Okta</title>
		<link>https://demo.searchstax.com/docs/single-sign-on-okta/</link>
					<comments>https://demo.searchstax.com/docs/single-sign-on-okta/#respond</comments>
		
		<dc:creator><![CDATA[Dipsy]]></dc:creator>
		<pubDate>Tue, 08 Nov 2022 17:47:23 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Cloud]]></category>
		<guid isPermaLink="false">https://demo.searchstax.com/docs/?p=13550</guid>

					<description><![CDATA[<p>Managed Search Single Sign-On (SSO) for Okta The SearchStax Managed Search service now offers the ability for clients to set up Single Sign-On (SSO) to let their users log into&#8230; <a class="more-link" href="https://demo.searchstax.com/docs/single-sign-on-okta/">Continue reading <span class="screen-reader-text">Single Sign-On &#8211; Okta</span></a></p>
<p>The post <a href="https://demo.searchstax.com/docs/single-sign-on-okta/">Single Sign-On &#8211; Okta</a> appeared first on <a href="https://demo.searchstax.com/docs">SearchStax Docs</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<h1 class="wp-block-heading" id="h-managed-search-single-sign-on-sso-for-okta">Managed Search Single Sign-On (SSO) for Okta</h1>



<hr class="wp-block-separator has-css-opacity"/>



<p>The SearchStax Managed Search service now offers the ability for clients to set up <strong>Single Sign-On</strong> (SSO) to let their users log into SearchStax apps with a single ID and password that works across multiple software systems.</p>



<p>We use the open standard Security Assertion Markup Language (SAML) to allow identity providers (IdP) to pass authorization credentials to service providers (SP). This page provides instruction to use <a href="https://www.okta.com/">Okta</a> to implement SSO for Managed Search.</p>



<p>SSO is an add-on Managed Search feature that is purchased separately. If you are interested in SSO, please <a href="https://www.searchstax.com/talk-to-sales/">contact Sales</a>.</p>



<p>Once SSO is enabled for your account and a domain is set up, the admin is able to see the configuration options in the User Preferences screen of the Managed Search Dashboard.</p>



<p>The following steps explain how it can be set up for Okta.</p>



<h2 class="wp-block-heading" id="h-instructions">Instructions</h2>



<p>Once your account has been enabled for SSO by the SearchStax team and a domain has been provided, the account <strong>owner</strong> and/or <strong>admin</strong> can see the option to complete set up. This option is found in the User Preferences screen of the Managed Search Dashboard:</p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="416" src="https://demo.searchstax.com/docs/wp-content/uploads/2022/11/image-31-1024x416.png" alt="" class="wp-image-13670" srcset="https://demo.searchstax.com/docs/wp-content/uploads/2022/11/image-31-1024x416.png 1024w, https://demo.searchstax.com/docs/wp-content/uploads/2022/11/image-31-300x122.png 300w, https://demo.searchstax.com/docs/wp-content/uploads/2022/11/image-31-768x312.png 768w, https://demo.searchstax.com/docs/wp-content/uploads/2022/11/image-31.png 1100w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>



<p><br><br><strong>1.</strong> You need to be an Admin in Okta to set up the SearchStax Application. </p>



<p><strong>2.</strong>  Go to the Okta Admin Console. Click on Applications &gt; &#8220;Create App Integration&#8221;. Select &#8220;SAML 2.0&#8221; and click on &#8220;Next&#8221;</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="952" height="558" src="https://demo.searchstax.com/docs/wp-content/uploads/2022/11/Screenshot-2022-11-07-at-4.50.05-PM.png" alt="" class="wp-image-13551" srcset="https://demo.searchstax.com/docs/wp-content/uploads/2022/11/Screenshot-2022-11-07-at-4.50.05-PM.png 952w, https://demo.searchstax.com/docs/wp-content/uploads/2022/11/Screenshot-2022-11-07-at-4.50.05-PM-300x176.png 300w, https://demo.searchstax.com/docs/wp-content/uploads/2022/11/Screenshot-2022-11-07-at-4.50.05-PM-768x450.png 768w" sizes="auto, (max-width: 952px) 100vw, 952px" /></figure>



<p><strong>3.</strong> Enter the name of the App  as &#8220;SearchStax Cloud&#8221; and click on Next</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="786" height="546" src="https://demo.searchstax.com/docs/wp-content/uploads/2022/11/Screenshot-2022-11-07-at-4.52.31-PM.png" alt="" class="wp-image-13552" srcset="https://demo.searchstax.com/docs/wp-content/uploads/2022/11/Screenshot-2022-11-07-at-4.52.31-PM.png 786w, https://demo.searchstax.com/docs/wp-content/uploads/2022/11/Screenshot-2022-11-07-at-4.52.31-PM-300x208.png 300w, https://demo.searchstax.com/docs/wp-content/uploads/2022/11/Screenshot-2022-11-07-at-4.52.31-PM-768x533.png 768w" sizes="auto, (max-width: 786px) 100vw, 786px" /></figure>



<p><strong>4.</strong> Configure the SAML Settings with the following information:</p>



<ul class="wp-block-list">
<li>Set the “Single sign on URL” as the Assertion Consumer Service URL provided in SearchStax Cloud</li>



<li>Check on &#8220;Use this for Recipient URL and Destination URL&#8221;</li>



<li>Set the &#8220;Audience URI&#8221;as the Metadata URL provided in SearchStax Cloud</li>



<li>Set the &#8220;Name ID format&#8221; as &#8220;Unspecified&#8221;</li>



<li>Set the &#8220;Application username&#8221; as &#8220;Email&#8221;</li>



<li>Set the &#8220;Update application username on&#8221; as &#8220;Create and update&#8221;</li>
</ul>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="929" height="926" src="https://demo.searchstax.com/docs/wp-content/uploads/2022/11/image-35.png" alt="" class="wp-image-13690" srcset="https://demo.searchstax.com/docs/wp-content/uploads/2022/11/image-35.png 929w, https://demo.searchstax.com/docs/wp-content/uploads/2022/11/image-35-300x300.png 300w, https://demo.searchstax.com/docs/wp-content/uploads/2022/11/image-35-150x150.png 150w, https://demo.searchstax.com/docs/wp-content/uploads/2022/11/image-35-768x766.png 768w" sizes="auto, (max-width: 929px) 100vw, 929px" /></figure>



<p><strong>5.</strong> Click on &#8220;Show Advanced Settings&#8221; and set &#8220;Response&#8221; and &#8220;Assertion Signature&#8221; to &#8220;Signed&#8221;. Below is a sample of Advanced Settings</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="576" height="721" src="https://demo.searchstax.com/docs/wp-content/uploads/2022/11/Screenshot-2022-11-07-at-5.03.42-PM.png" alt="" class="wp-image-13557" srcset="https://demo.searchstax.com/docs/wp-content/uploads/2022/11/Screenshot-2022-11-07-at-5.03.42-PM.png 576w, https://demo.searchstax.com/docs/wp-content/uploads/2022/11/Screenshot-2022-11-07-at-5.03.42-PM-240x300.png 240w" sizes="auto, (max-width: 576px) 100vw, 576px" /></figure>



<p>*If you change the response and assertion settings, you will need to also change the SearchStax Cloud &#8220;Assertions responses signed*&#8221; setting to match.</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="810" height="86" src="https://demo.searchstax.com/docs/wp-content/uploads/2022/11/image-37.png" alt="" class="wp-image-13692" srcset="https://demo.searchstax.com/docs/wp-content/uploads/2022/11/image-37.png 810w, https://demo.searchstax.com/docs/wp-content/uploads/2022/11/image-37-300x32.png 300w, https://demo.searchstax.com/docs/wp-content/uploads/2022/11/image-37-768x82.png 768w" sizes="auto, (max-width: 810px) 100vw, 810px" /></figure>



<p><strong>6.</strong> The next section provides Attribute Statements for mapping Okta fields to SearchStax. Below are sample mappings that we defined</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="623" height="694" src="https://demo.searchstax.com/docs/wp-content/uploads/2022/11/Screenshot-2022-11-07-at-5.05.04-PM.png" alt="" class="wp-image-13558" srcset="https://demo.searchstax.com/docs/wp-content/uploads/2022/11/Screenshot-2022-11-07-at-5.05.04-PM.png 623w, https://demo.searchstax.com/docs/wp-content/uploads/2022/11/Screenshot-2022-11-07-at-5.05.04-PM-269x300.png 269w" sizes="auto, (max-width: 623px) 100vw, 623px" /></figure>



<p>The above example assigns the role of &#8220;Admin&#8221; to all users in SearchStax Cloud. However, if you have a different field in Okta that maps the role, you can assign that field instead. <a href="https://demo.searchstax.com/docs/hc/searchstax-users/">Here</a> is more information about roles in SearchStax Cloud. If a role is not specified, users will be provisioned with the &#8220;Team Member&#8221; role, which is a read-only role.</p>



<p>Click on Next.</p>



<p><strong>7.</strong> Select &#8220;I&#8217;m an Okta customer adding an internal app&#8221; and click on &#8220;Finish&#8221;</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="856" height="426" src="https://demo.searchstax.com/docs/wp-content/uploads/2022/11/Screenshot-2022-11-07-at-5.06.58-PM.png" alt="" class="wp-image-13559" srcset="https://demo.searchstax.com/docs/wp-content/uploads/2022/11/Screenshot-2022-11-07-at-5.06.58-PM.png 856w, https://demo.searchstax.com/docs/wp-content/uploads/2022/11/Screenshot-2022-11-07-at-5.06.58-PM-300x149.png 300w, https://demo.searchstax.com/docs/wp-content/uploads/2022/11/Screenshot-2022-11-07-at-5.06.58-PM-768x382.png 768w" sizes="auto, (max-width: 856px) 100vw, 856px" /></figure>



<p><strong>8.</strong> Now click on the &#8220;View SAML setup instructions&#8221; button that is displayed to the right</p>



<p></p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="811" height="828" src="https://demo.searchstax.com/docs/wp-content/uploads/2022/11/Screenshot-2022-11-07-at-5.08.20-PM.png" alt="" class="wp-image-13560" srcset="https://demo.searchstax.com/docs/wp-content/uploads/2022/11/Screenshot-2022-11-07-at-5.08.20-PM.png 811w, https://demo.searchstax.com/docs/wp-content/uploads/2022/11/Screenshot-2022-11-07-at-5.08.20-PM-294x300.png 294w, https://demo.searchstax.com/docs/wp-content/uploads/2022/11/Screenshot-2022-11-07-at-5.08.20-PM-768x784.png 768w" sizes="auto, (max-width: 811px) 100vw, 811px" /></figure>



<p><strong>9.</strong> Copy the &#8220;Identity Provider Single Sign-On URL&#8221; from the screen and set it as the Login url in SearchStax Cloud.</p>



<p><strong>10.</strong> Copy the &#8220;Identity Provider Issuer&#8221; from the screen and set it as the Idp entity url in SearchStax Cloud.</p>



<p><strong>11.</strong> Copy the XML shown in the <strong>Optional section</strong> with the title &#8220;Provide the following IDP metadata to your SP Provider&#8221; and host it on a URL (optionally, you can send it to us and we can host this for you). Copy this hosted IDP metadata URL and set it as the Metadata url in SearchStax Cloud.</p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="660" src="https://demo.searchstax.com/docs/wp-content/uploads/2022/11/image-38-1024x660.png" alt="" class="wp-image-13693" srcset="https://demo.searchstax.com/docs/wp-content/uploads/2022/11/image-38-1024x660.png 1024w, https://demo.searchstax.com/docs/wp-content/uploads/2022/11/image-38-300x193.png 300w, https://demo.searchstax.com/docs/wp-content/uploads/2022/11/image-38-768x495.png 768w, https://demo.searchstax.com/docs/wp-content/uploads/2022/11/image-38.png 1110w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>



<p></p>



<p><strong>12.</strong> Now, set SSO to &#8220;Enabled&#8221;. </p>



<p>When you are testing, also check &#8220;Allow email password login&#8221; (You can turn this off once SSO testing is complete). Here is our example setting page:</p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="695" src="https://demo.searchstax.com/docs/wp-content/uploads/2022/11/image-39-1024x695.png" alt="" class="wp-image-13694" srcset="https://demo.searchstax.com/docs/wp-content/uploads/2022/11/image-39-1024x695.png 1024w, https://demo.searchstax.com/docs/wp-content/uploads/2022/11/image-39-300x204.png 300w, https://demo.searchstax.com/docs/wp-content/uploads/2022/11/image-39-768x521.png 768w, https://demo.searchstax.com/docs/wp-content/uploads/2022/11/image-39.png 1099w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>



<p>Once set up is complete, the &#8220;Your direct Sign-In URL&#8221; is the URL that your team can use for signing into SearchStax Cloud. They can also enter the domain name mentioned when choosing Single Sign-On from the SearchStax Cloud Sign-In page.</p>



<p></p>



<h2 class="wp-block-heading" id="h-login-using-sso">Login Using SSO</h2>



<p>On <a href="https://app.searchstax.com/login" target="_blank" rel="noreferrer noopener">https://app.searchstax.com/</a> , click the “Sign-In With your ID Provider&#8221; button.</p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="637" src="https://demo.searchstax.com/docs/wp-content/uploads/2024/06/image-24-1024x637.png" alt="" class="wp-image-18945" srcset="https://demo.searchstax.com/docs/wp-content/uploads/2024/06/image-24-1024x637.png 1024w, https://demo.searchstax.com/docs/wp-content/uploads/2024/06/image-24-300x187.png 300w, https://demo.searchstax.com/docs/wp-content/uploads/2024/06/image-24-768x478.png 768w, https://demo.searchstax.com/docs/wp-content/uploads/2024/06/image-24.png 1056w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>



<p></p>



<p>Enter the domain.</p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="630" src="https://demo.searchstax.com/docs/wp-content/uploads/2024/06/image-26-1024x630.png" alt="" class="wp-image-18948" srcset="https://demo.searchstax.com/docs/wp-content/uploads/2024/06/image-26-1024x630.png 1024w, https://demo.searchstax.com/docs/wp-content/uploads/2024/06/image-26-300x185.png 300w, https://demo.searchstax.com/docs/wp-content/uploads/2024/06/image-26-768x473.png 768w, https://demo.searchstax.com/docs/wp-content/uploads/2024/06/image-26.png 1040w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>



<p></p>



<p>Click <strong>Continue</strong>. This takes you to the Okta Sign-in page. After you authenticate, it brings you back to your SearchStax Cloud Dashboard.</p>



<p>Alternately, you can directly go to https://&lt;Subdomain&gt;.searchstax.com to login, and clicking on the “Sign-In With your ID Provider” will take you directly to Okta Sign In.</p>



<h2 class="wp-block-heading" id="h-sso-two-factor-authentication"><strong>SSO + Two-factor Authentication</strong></h2>



<p>A User can have SSO and Two-Factor authentication both setup. The 2FA settings for a user will apply to all accounts that the user has access to.</p>



<p>However, for the account that has SSO Setup, while logging in, SearchStax 2FA settings will not apply. In that case, 2FA should be set up at the SSO Provider.</p>



<div class="wp-block-group"><div class="wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained">
<h2 class="wp-block-heading" id="questions">Questions?</h2>



<p>Do not hesitate to contact the <a href="mailto:support@demo.searchstax.com?subject=SearchStax%20Cloud%20Single%20Sign-On%20%28SSO%29%20Setup%20for%20Okta" target="_blank" rel="noreferrer noopener">SearchStax Support Desk</a>.</p>
</div></div>
<p>The post <a href="https://demo.searchstax.com/docs/single-sign-on-okta/">Single Sign-On &#8211; Okta</a> appeared first on <a href="https://demo.searchstax.com/docs">SearchStax Docs</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://demo.searchstax.com/docs/single-sign-on-okta/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Single Sign-On &#8211; OneLogin</title>
		<link>https://demo.searchstax.com/docs/single-sign-on-onelogin/</link>
					<comments>https://demo.searchstax.com/docs/single-sign-on-onelogin/#respond</comments>
		
		<dc:creator><![CDATA[Bruce]]></dc:creator>
		<pubDate>Wed, 04 Oct 2023 14:47:00 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Cloud]]></category>
		<guid isPermaLink="false">https://demo.searchstax.com/docs/?p=16391</guid>

					<description><![CDATA[<p>Managed Search Single Sign-On (SSO) OneLogin The SearchStax Managed Search service now offers the ability for customers to set up Single Sign-On (SSO) using OneLogin to let their users log&#8230; <a class="more-link" href="https://demo.searchstax.com/docs/single-sign-on-onelogin/">Continue reading <span class="screen-reader-text">Single Sign-On &#8211; OneLogin</span></a></p>
<p>The post <a href="https://demo.searchstax.com/docs/single-sign-on-onelogin/">Single Sign-On &#8211; OneLogin</a> appeared first on <a href="https://demo.searchstax.com/docs">SearchStax Docs</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<h1 class="wp-block-heading" id="h-managed-search-single-sign-on-sso-onelogin">Managed Search Single Sign-On (SSO) OneLogin</h1>



<hr class="wp-block-separator has-css-opacity"/>





<p>The SearchStax Managed Search service now offers the ability for customers to set up <strong>Single Sign-On</strong> (SSO) using OneLogin to let their users log into SearchStax apps with a single ID and password that works across multiple software systems.</p>



<p>We use the open standard Security Assertion Markup Language (SAML) to allow identity providers (IdP) to pass authorization credentials to service providers (SP). This page provides instructions on how to configure OneLogin SSO with SearchStax.</p>



<p>SSO is an add-on SearchStax feature that is purchased separately. If you are interested in SSO for your deployment, please <a href="https://www.searchstax.com/talk-to-sales/">contact Sales</a>.</p>



<p>The following steps explain how it can be set up for OneLogin.</p>



<h2 class="wp-block-heading" id="h-instructions">Instructions</h2>



<p>Once SSO is enabled by SearchStax for your account, the <strong>owner</strong> and/or <strong>admin</strong> can see options to set it up. The options to set up SSO are in the User Preferences screen of the Managed Search Dashboard:</p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="409" src="https://demo.searchstax.com/docs/wp-content/uploads/2024/06/image-27-1024x409.png" alt="" class="wp-image-18950" srcset="https://demo.searchstax.com/docs/wp-content/uploads/2024/06/image-27-1024x409.png 1024w, https://demo.searchstax.com/docs/wp-content/uploads/2024/06/image-27-300x120.png 300w, https://demo.searchstax.com/docs/wp-content/uploads/2024/06/image-27-768x306.png 768w, https://demo.searchstax.com/docs/wp-content/uploads/2024/06/image-27-1536x613.png 1536w, https://demo.searchstax.com/docs/wp-content/uploads/2024/06/image-27-1568x626.png 1568w, https://demo.searchstax.com/docs/wp-content/uploads/2024/06/image-27.png 1624w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>



<p>The first option is the Single Sign-On subdomain. This is a label like <strong>mycompany</strong>, which the system will use to build a URL such as <strong>mycompany.searchstax.com</strong>. </p>



<p>Click Next to view the next page of SSO parameters.</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="968" height="285" src="https://demo.searchstax.com/docs/wp-content/uploads/2023/09/image-25.png" alt="" class="wp-image-16349"/></figure>



<p>The &#8220;direct Sign-In URL&#8221; is the URL that your team can use for signing into Managed Search. The other two URLs are discussed below.</p>



<p></p>



<ol start="1" class="wp-block-list">
<li>Go to OneLogin administration dashboard and select the Applications drop down. Select <strong>Add App</strong> in the top right corner:<br> <img loading="lazy" decoding="async" width="200" height="126" class="wp-image-16395" style="width: 200px;" src="https://demo.searchstax.com/docs/wp-content/uploads/2023/09/Pasted.png" alt=""></li>



<li>Now Search for “SAML Custom Connector (Advanced)” and then select the application:<br><img loading="lazy" decoding="async" width="400" height="208" class="wp-image-16396" style="width: 400px;" src="https://demo.searchstax.com/docs/wp-content/uploads/2023/09/Pasted-1.png" alt="" srcset="https://demo.searchstax.com/docs/wp-content/uploads/2023/09/Pasted-1.png 399w, https://demo.searchstax.com/docs/wp-content/uploads/2023/09/Pasted-1-300x156.png 300w" sizes="auto, (max-width: 400px) 100vw, 400px" /></li>



<li>Enter a display name for the custom SearchStax application &#8211; something like &#8220;SearchStax”. Feel free to customize the icon as well then click <strong>Save</strong> in the top right corner:<br><img loading="lazy" decoding="async" width="600" height="390" class="wp-image-16397" style="width: 600px;" src="https://demo.searchstax.com/docs/wp-content/uploads/2023/09/Pasted-2.png" alt="" srcset="https://demo.searchstax.com/docs/wp-content/uploads/2023/09/Pasted-2.png 773w, https://demo.searchstax.com/docs/wp-content/uploads/2023/09/Pasted-2-300x195.png 300w, https://demo.searchstax.com/docs/wp-content/uploads/2023/09/Pasted-2-768x500.png 768w" sizes="auto, (max-width: 600px) 100vw, 600px" /></li>



<li>This creates a new Application in your user dashboard. Now go back to the applications tab still inside the administration dashboard and select your newly created application. You will see some new tabs on the left. Select the <strong>Configuration Tab</strong>:<br><img loading="lazy" decoding="async" width="400" height="196" class="wp-image-16398" style="width: 400px;" src="https://demo.searchstax.com/docs/wp-content/uploads/2023/09/Pasted-3.png" alt="" srcset="https://demo.searchstax.com/docs/wp-content/uploads/2023/09/Pasted-3.png 461w, https://demo.searchstax.com/docs/wp-content/uploads/2023/09/Pasted-3-300x147.png 300w" sizes="auto, (max-width: 400px) 100vw, 400px" /></li>



<li>This tab is where you will configure the SSO application with the information provided in our SearchStax dashboard. Since we used &#8220;mycompany&#8221; as our subdomain we will continue to use that here as well. Enter the provided metadata URL in the Audience (EntityID) box<br><br><img loading="lazy" decoding="async" width="700" height="149" class="wp-image-16400" style="width: 700px;" src="https://demo.searchstax.com/docs/wp-content/uploads/2023/09/Pasted-5.png" alt="" srcset="https://demo.searchstax.com/docs/wp-content/uploads/2023/09/Pasted-5.png 1107w, https://demo.searchstax.com/docs/wp-content/uploads/2023/09/Pasted-5-300x64.png 300w, https://demo.searchstax.com/docs/wp-content/uploads/2023/09/Pasted-5-1024x217.png 1024w, https://demo.searchstax.com/docs/wp-content/uploads/2023/09/Pasted-5-768x163.png 768w" sizes="auto, (max-width: 700px) 100vw, 700px" /></li>



<li>Enter the provided ACS URLs into the Recipient, ACS Validator, and ACS URL boxes:<br><img loading="lazy" decoding="async" width="500" height="363" class="wp-image-16401" style="width: 500px;" src="https://demo.searchstax.com/docs/wp-content/uploads/2023/09/Pasted-6.png" alt="" srcset="https://demo.searchstax.com/docs/wp-content/uploads/2023/09/Pasted-6.png 487w, https://demo.searchstax.com/docs/wp-content/uploads/2023/09/Pasted-6-300x218.png 300w" sizes="auto, (max-width: 500px) 100vw, 500px" /></li>



<li>Enter the Login URL into the Login URL Box:<br> <img loading="lazy" decoding="async" width="400" height="168" class="wp-image-16402" style="width: 400px;" src="https://demo.searchstax.com/docs/wp-content/uploads/2023/09/Pasted-7.png" alt="" srcset="https://demo.searchstax.com/docs/wp-content/uploads/2023/09/Pasted-7.png 357w, https://demo.searchstax.com/docs/wp-content/uploads/2023/09/Pasted-7-300x126.png 300w" sizes="auto, (max-width: 400px) 100vw, 400px" /></li>



<li>Be sure your settings align with what is shown below. This will be SP initiated, with a <strong>Persistent</strong> nameID, and both the assertion and response will be signed, then click <strong>Save</strong> in the top right: <br><img loading="lazy" decoding="async" width="500" height="445" class="wp-image-16403" style="width: 500px;" src="https://demo.searchstax.com/docs/wp-content/uploads/2023/09/Pasted-8.png" alt="" srcset="https://demo.searchstax.com/docs/wp-content/uploads/2023/09/Pasted-8.png 392w, https://demo.searchstax.com/docs/wp-content/uploads/2023/09/Pasted-8-300x267.png 300w" sizes="auto, (max-width: 500px) 100vw, 500px" /></li>



<li><mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-accent-color"></mark>Select the Parameters tab on the left. We expect <strong>Email, First Name</strong>, and <strong>Last Name</strong> to be passed so your parameters should look like the box below. You also have the ability to pass a &#8220;role&#8221; parameter. If you do not have a mapping for SearchStax roles, you can leave it as it, and the users will get created with <strong>Team Member</strong> as the role by default. These roles can always be changed later from the Managed Search Dashboard: <br><img loading="lazy" decoding="async" width="600" height="154" class="wp-image-16404" style="width: 600px;" src="https://demo.searchstax.com/docs/wp-content/uploads/2023/09/Pasted-9.png" alt="" srcset="https://demo.searchstax.com/docs/wp-content/uploads/2023/09/Pasted-9.png 996w, https://demo.searchstax.com/docs/wp-content/uploads/2023/09/Pasted-9-300x77.png 300w, https://demo.searchstax.com/docs/wp-content/uploads/2023/09/Pasted-9-768x197.png 768w" sizes="auto, (max-width: 600px) 100vw, 600px" /><br></li>



<li>Next click into the SSO tab on the left. Take note of the Issuer URL and the SAML 2.0 Endpoint. <br><img loading="lazy" decoding="async" width="600" height="150" class="wp-image-16406" style="width: 600px;" src="https://demo.searchstax.com/docs/wp-content/uploads/2023/09/Pasted-11.png" alt="" srcset="https://demo.searchstax.com/docs/wp-content/uploads/2023/09/Pasted-11.png 770w, https://demo.searchstax.com/docs/wp-content/uploads/2023/09/Pasted-11-300x75.png 300w, https://demo.searchstax.com/docs/wp-content/uploads/2023/09/Pasted-11-768x192.png 768w" sizes="auto, (max-width: 600px) 100vw, 600px" /><br>You will be putting these values in the Managed Search dashboard as shown below. Click <strong>Save Settings</strong> when finished:<br><br><img loading="lazy" decoding="async" width="700" height="348" class="wp-image-16405" style="width: 700px;" src="https://demo.searchstax.com/docs/wp-content/uploads/2023/09/Pasted-10.png" alt="" srcset="https://demo.searchstax.com/docs/wp-content/uploads/2023/09/Pasted-10.png 1281w, https://demo.searchstax.com/docs/wp-content/uploads/2023/09/Pasted-10-300x149.png 300w, https://demo.searchstax.com/docs/wp-content/uploads/2023/09/Pasted-10-1024x509.png 1024w, https://demo.searchstax.com/docs/wp-content/uploads/2023/09/Pasted-10-768x382.png 768w" sizes="auto, (max-width: 700px) 100vw, 700px" /></li>
</ol>



<p>The steps below show how we have integrated it with our OneLogin instance.</p>



<h2 class="wp-block-heading" id="h-login-using-sso">Login Using SSO</h2>



<p><a href="https://app.searchstax.com/login" target="_blank" rel="noreferrer noopener">https://app.searchstax.com/</a> now provides a button at the bottom for SSO &#8211; “Sign-In With your ID Provider.” Click this button.</p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="637" src="https://demo.searchstax.com/docs/wp-content/uploads/2024/06/image-28-1024x637.png" alt="" class="wp-image-18952" srcset="https://demo.searchstax.com/docs/wp-content/uploads/2024/06/image-28-1024x637.png 1024w, https://demo.searchstax.com/docs/wp-content/uploads/2024/06/image-28-300x187.png 300w, https://demo.searchstax.com/docs/wp-content/uploads/2024/06/image-28-768x478.png 768w, https://demo.searchstax.com/docs/wp-content/uploads/2024/06/image-28.png 1056w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>



<p>Enter the domain that was set up for the client.</p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="630" src="https://demo.searchstax.com/docs/wp-content/uploads/2024/06/image-29-1024x630.png" alt="" class="wp-image-18953" srcset="https://demo.searchstax.com/docs/wp-content/uploads/2024/06/image-29-1024x630.png 1024w, https://demo.searchstax.com/docs/wp-content/uploads/2024/06/image-29-300x185.png 300w, https://demo.searchstax.com/docs/wp-content/uploads/2024/06/image-29-768x473.png 768w, https://demo.searchstax.com/docs/wp-content/uploads/2024/06/image-29.png 1040w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>



<p>Click <strong>Continue</strong>. This takes you to OneLogin Sign-in page. After you authenticate, it brings you back to your SearchStax Dashboard.</p>



<p>Alternately, you can directly go to <strong>https://&lt;Subdomain&gt;.searchstax.com</strong> to login, and clicking on the “Sign-In With your ID Provider” will take you directly to OneLogin.</p>



<h2 class="wp-block-heading" id="h-sso-two-factor-authentication"><strong>SSO + Two-factor Authentication</strong></h2>



<p>A User can have SSO and Two-Factor authentication both setup. The 2FA settings for a user will apply to all accounts that the user has access to.</p>



<p>However, for the account that has SSO Setup, while logging in, SearchStax 2FA settings will not apply. In that case, 2FA should be set up at the SSO Provider.</p>



<div class="wp-block-group"><div class="wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained">
<h2 class="wp-block-heading" id="questions">Questions?</h2>



<p>Do not hesitate to contact the <a href="mailto:support@demo.searchstax.com?subject=SearchStax%20Cloud%20Single%20Sign-On%20%28SSO%29%20Azure%20AD" target="_blank" rel="noreferrer noopener">SearchStax Support Desk</a>.</p>
</div></div>
<p>The post <a href="https://demo.searchstax.com/docs/single-sign-on-onelogin/">Single Sign-On &#8211; OneLogin</a> appeared first on <a href="https://demo.searchstax.com/docs">SearchStax Docs</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://demo.searchstax.com/docs/single-sign-on-onelogin/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Single Sign-On &#8211; PingFederate</title>
		<link>https://demo.searchstax.com/docs/single-sign-on-pingfederate-2/</link>
					<comments>https://demo.searchstax.com/docs/single-sign-on-pingfederate-2/#respond</comments>
		
		<dc:creator><![CDATA[Alan]]></dc:creator>
		<pubDate>Fri, 25 Oct 2024 19:00:59 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Cloud]]></category>
		<guid isPermaLink="false">https://demo.searchstax.com/docs/?p=19898</guid>

					<description><![CDATA[<p>Managed Search Single Sign-On (SSO) PingFederate The SearchStax Managed Search service now offers the ability for customers to set up Single Sign-On (SSO) using PingFederate to let their users log&#8230; <a class="more-link" href="https://demo.searchstax.com/docs/single-sign-on-pingfederate-2/">Continue reading <span class="screen-reader-text">Single Sign-On &#8211; PingFederate</span></a></p>
<p>The post <a href="https://demo.searchstax.com/docs/single-sign-on-pingfederate-2/">Single Sign-On &#8211; PingFederate</a> appeared first on <a href="https://demo.searchstax.com/docs">SearchStax Docs</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<h1 class="wp-block-heading" id="h-managed-search-single-sign-on-sso-pingfederate">Managed Search Single Sign-On (SSO) PingFederate</h1>



<hr class="wp-block-separator has-css-opacity"/>





<p>The SearchStax Managed Search service now offers the ability for customers to set up <strong>Single Sign-On</strong> (SSO) using PingFederate to let their users log into SearchStax apps with a single ID and password that works across multiple software systems.</p>



<p>We use the open standard Security Assertion Markup Language (SAML) to allow identity providers (IdP) to pass authorization credentials to service providers (SP). This page provides instructions on how to configure PingFederate SSO with SearchStax.</p>



<p>SSO is an add-on SearchStax feature that is purchased separately. If you are interested in SSO, please <a href="https://www.searchstax.com/talk-to-sales/">contact Sales</a> or your Account Manager.</p>



<p>The following steps explain how it can be set up for PingFederate.</p>



<h2 class="wp-block-heading" id="h-instructions">Instructions</h2>



<p>Once SSO is enabled by SearchStax for your account, the <strong>owner</strong> and/or <strong>admin</strong> can see options to set it up. The options to set up SSO are in the User Preferences screen of the Managed Search Dashboard:</p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="409" src="https://demo.searchstax.com/docs/wp-content/uploads/2024/06/image-27-1024x409.png" alt="" class="wp-image-18950" srcset="https://demo.searchstax.com/docs/wp-content/uploads/2024/06/image-27-1024x409.png 1024w, https://demo.searchstax.com/docs/wp-content/uploads/2024/06/image-27-300x120.png 300w, https://demo.searchstax.com/docs/wp-content/uploads/2024/06/image-27-768x306.png 768w, https://demo.searchstax.com/docs/wp-content/uploads/2024/06/image-27-1536x613.png 1536w, https://demo.searchstax.com/docs/wp-content/uploads/2024/06/image-27-1568x626.png 1568w, https://demo.searchstax.com/docs/wp-content/uploads/2024/06/image-27.png 1624w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>



<p>The first option is the Single Sign-On subdomain. This is a label like <strong>mycompany</strong>, which the system will use to build a URL such as <strong>mycompany.searchstax.com</strong>. </p>



<p>Click Next to view the next page of SSO parameters.</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="968" height="285" src="https://demo.searchstax.com/docs/wp-content/uploads/2023/09/image-25.png" alt="" class="wp-image-16349"/></figure>



<p>The &#8220;direct Sign-In URL&#8221; is the URL that your team can use for signing into Managed Search. The other two URLs are discussed below.</p>



<p>Note: Make sure you have an Adapter already set up inside PingFederate!</p>



<p></p>



<ol start="1" class="wp-block-list">
<li>Go to PingFederate IdP administration console and select the  <strong>Create New </strong>button underneath the SP Connections section:<br> <img loading="lazy" decoding="async" width="300" height="158" class="wp-image-19900" style="width: 300px;" src="https://demo.searchstax.com/docs/wp-content/uploads/2024/10/Adapters-1.png" alt="" srcset="https://demo.searchstax.com/docs/wp-content/uploads/2024/10/Adapters-1.png 359w, https://demo.searchstax.com/docs/wp-content/uploads/2024/10/Adapters-1-300x158.png 300w" sizes="auto, (max-width: 300px) 100vw, 300px" /></li>



<li>In the Connection Type tab select the <strong>Browser SSO Profiles/SAML 2.0 Template</strong> then click Next. In the Connection Options continue with <strong>Browser SSO</strong> and hit Next again:<br><img loading="lazy" decoding="async" width="300" height="254" class="wp-image-19901" style="width: 300px;" src="https://demo.searchstax.com/docs/wp-content/uploads/2024/10/ConnectionType.png" alt="" srcset="https://demo.searchstax.com/docs/wp-content/uploads/2024/10/ConnectionType.png 369w, https://demo.searchstax.com/docs/wp-content/uploads/2024/10/ConnectionType-300x254.png 300w" sizes="auto, (max-width: 300px) 100vw, 300px" /><img loading="lazy" decoding="async" width="250" height="249" class="wp-image-19902" style="width: 250px;" src="https://demo.searchstax.com/docs/wp-content/uploads/2024/10/ConnectionOptions.png" alt="" srcset="https://demo.searchstax.com/docs/wp-content/uploads/2024/10/ConnectionOptions.png 267w, https://demo.searchstax.com/docs/wp-content/uploads/2024/10/ConnectionOptions-150x150.png 150w" sizes="auto, (max-width: 250px) 100vw, 250px" /></li>



<li>The next tab is the Import Metadata tab. You can choose to extract our metadata from the URL (shown in a screenshot above the instructions) in our dashboard and import it here, this will prefill some future sections for you:<img loading="lazy" decoding="async" width="350" height="169" class="wp-image-19904" style="width: 350px;" src="https://demo.searchstax.com/docs/wp-content/uploads/2024/10/ImportMetadata.png" alt="" srcset="https://demo.searchstax.com/docs/wp-content/uploads/2024/10/ImportMetadata.png 376w, https://demo.searchstax.com/docs/wp-content/uploads/2024/10/ImportMetadata-300x145.png 300w" sizes="auto, (max-width: 350px) 100vw, 350px" /><br></li>



<li>In the General Info tab you will need to ensure that the following boxes have the correct information in them whether you imported our metadata or not. <br><br>The Entity ID box should contain our EntityID which is also our metadata URL.<br> <br>Connection Name is whatever you want to use to identify this connection in your PingFed dashboard. <br><br>Virtual Server IDS is important because it will overwrite your &#8220;master&#8221; EntityID and display a value in your metadata that we require to connect properly. This will also need to be in a URL format so something like https://sso-t.com/idp/SSO.saml2 is recommended. <br><br>After this scroll to the bottom and click next<br><img loading="lazy" decoding="async" width="400" height="330" class="wp-image-19905" style="width: 400px;" src="https://demo.searchstax.com/docs/wp-content/uploads/2024/10/GeneralInfo.png" alt="" srcset="https://demo.searchstax.com/docs/wp-content/uploads/2024/10/GeneralInfo.png 460w, https://demo.searchstax.com/docs/wp-content/uploads/2024/10/GeneralInfo-300x248.png 300w" sizes="auto, (max-width: 400px) 100vw, 400px" /><br></li>



<li>The next tab is where you will configure the Browser SSO settings. After clicking configure Browser SSO select SP-Initiated SSO and hit Next. <br><img loading="lazy" decoding="async" width="300" height="211" class="wp-image-19907" style="width: 300px;" src="https://demo.searchstax.com/docs/wp-content/uploads/2024/10/SPInitiated.png" alt="" srcset="https://demo.searchstax.com/docs/wp-content/uploads/2024/10/SPInitiated.png 339w, https://demo.searchstax.com/docs/wp-content/uploads/2024/10/SPInitiated-300x211.png 300w" sizes="auto, (max-width: 300px) 100vw, 300px" /><br>We left the Assertion Lifetime settings as default and then hit next again. <br><img loading="lazy" decoding="async" width="300" height="233" class="wp-image-19908" style="width: 300px;" src="https://demo.searchstax.com/docs/wp-content/uploads/2024/10/AssertionLifetime.png" alt="" srcset="https://demo.searchstax.com/docs/wp-content/uploads/2024/10/AssertionLifetime.png 329w, https://demo.searchstax.com/docs/wp-content/uploads/2024/10/AssertionLifetime-300x233.png 300w" sizes="auto, (max-width: 300px) 100vw, 300px" /><br></li>



<li>Next we need to configure the Assertion Creation by clicking the Configure Assertion Creation button. Keep standard identity mapping and hit Next. In the Attribute Contract tab you will need to pass <strong>surname, email, and givenName</strong> in the assertion via the Extend the Contract sections and then hit Next. <br><img loading="lazy" decoding="async" width="500" height="243" class="wp-image-19910" style="width: 500px;" src="https://demo.searchstax.com/docs/wp-content/uploads/2024/10/Attributes.png" alt="" srcset="https://demo.searchstax.com/docs/wp-content/uploads/2024/10/Attributes.png 636w, https://demo.searchstax.com/docs/wp-content/uploads/2024/10/Attributes-300x146.png 300w" sizes="auto, (max-width: 500px) 100vw, 500px" /><br></li>



<li>Now that the attributes are created they need to be mapped. This is done with the Map New Adapter Instance button on the Authentication Source Mapping tab. <br><br>Here you will select the Adapter you have configured for this connection and then hit Next until you come to the Attribute Contract Fulfillment tab. <br><br>Here you will map your values to the email, surname, and givenName attributes being passed from your end, when finished hit Next and then the Done button until you see the Configure Protocol Settings button. <br> <img loading="lazy" decoding="async" width="550" height="176" class="wp-image-19911" style="width: 550px;" src="https://demo.searchstax.com/docs/wp-content/uploads/2024/10/Mapping.png" alt="" srcset="https://demo.searchstax.com/docs/wp-content/uploads/2024/10/Mapping.png 756w, https://demo.searchstax.com/docs/wp-content/uploads/2024/10/Mapping-300x96.png 300w" sizes="auto, (max-width: 550px) 100vw, 550px" /><br><br></li>



<li>When configuring the protocol you will want to send your POST requests to the ACS URL provided in our SearchStax dashboard. <br><img loading="lazy" decoding="async" width="450" height="214" class="wp-image-19916" style="width: 450px;" src="https://demo.searchstax.com/docs/wp-content/uploads/2024/10/ACS.png" alt="" srcset="https://demo.searchstax.com/docs/wp-content/uploads/2024/10/ACS.png 744w, https://demo.searchstax.com/docs/wp-content/uploads/2024/10/ACS-300x142.png 300w" sizes="auto, (max-width: 450px) 100vw, 450px" /><br>It will look something like this *.searchstax.com/saml2/acs/ then hit Next until you arrive at the Signature Policy Tab. <br><br>Here you will select the <strong>Always Sign the SAML Assertion </strong>box. Now hit Next again until you get to the Configure Credentials button.<br><img loading="lazy" decoding="async" width="450" height="197" class="wp-image-19918" style="width: 450px;" src="https://demo.searchstax.com/docs/wp-content/uploads/2024/10/SignedAssertions.png" alt="" srcset="https://demo.searchstax.com/docs/wp-content/uploads/2024/10/SignedAssertions.png 737w, https://demo.searchstax.com/docs/wp-content/uploads/2024/10/SignedAssertions-300x131.png 300w" sizes="auto, (max-width: 450px) 100vw, 450px" /><br><br></li>



<li>Here you are selecting the valid certificate used in your signings:<br><img loading="lazy" decoding="async" width="450" height="215" class="wp-image-19917" style="width: 450px;" src="https://demo.searchstax.com/docs/wp-content/uploads/2024/10/Certificate.png" alt="" srcset="https://demo.searchstax.com/docs/wp-content/uploads/2024/10/Certificate.png 738w, https://demo.searchstax.com/docs/wp-content/uploads/2024/10/Certificate-300x143.png 300w" sizes="auto, (max-width: 450px) 100vw, 450px" /><br><br>Now hit Next and review all the tabs that are presented. If everything looks good you can activate the connection and then hit <strong>Save</strong>. <br><br></li>



<li style="padding-top:0;padding-bottom:0">When you are finished settings things up in PingFed you will need to come back to our dashboard and input the values of your SSO:<br><img loading="lazy" decoding="async" width="500" height="251" class="wp-image-19921" style="width: 500px;" src="https://demo.searchstax.com/docs/wp-content/uploads/2024/10/PingFedInfo.png" alt="" srcset="https://demo.searchstax.com/docs/wp-content/uploads/2024/10/PingFedInfo.png 1278w, https://demo.searchstax.com/docs/wp-content/uploads/2024/10/PingFedInfo-300x151.png 300w, https://demo.searchstax.com/docs/wp-content/uploads/2024/10/PingFedInfo-1024x514.png 1024w, https://demo.searchstax.com/docs/wp-content/uploads/2024/10/PingFedInfo-768x386.png 768w" sizes="auto, (max-width: 500px) 100vw, 500px" /><br><br>We need your IdP Entity URL, as discussed above this will be your VSID that you configured specifically for this connection. <br>The URL to your metadata.<br>Then finally the Login URL used for this connection. <br>Once the above is added you can select the Enabled box and hit Save Settings. <br><br></li>
</ol>



<p></p>



<h2 class="wp-block-heading" id="h-login-using-sso">Login Using SSO</h2>



<p><a href="https://app.searchstax.com/login" target="_blank" rel="noreferrer noopener">https://app.searchstax.com/</a> now provides a button at the bottom for SSO &#8211; “Sign-In With your ID Provider.” Click this button.</p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="637" src="https://demo.searchstax.com/docs/wp-content/uploads/2024/06/image-28-1024x637.png" alt="" class="wp-image-18952" srcset="https://demo.searchstax.com/docs/wp-content/uploads/2024/06/image-28-1024x637.png 1024w, https://demo.searchstax.com/docs/wp-content/uploads/2024/06/image-28-300x187.png 300w, https://demo.searchstax.com/docs/wp-content/uploads/2024/06/image-28-768x478.png 768w, https://demo.searchstax.com/docs/wp-content/uploads/2024/06/image-28.png 1056w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>



<p>Enter the domain that was set up for the client.</p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="630" src="https://demo.searchstax.com/docs/wp-content/uploads/2024/06/image-29-1024x630.png" alt="" class="wp-image-18953" srcset="https://demo.searchstax.com/docs/wp-content/uploads/2024/06/image-29-1024x630.png 1024w, https://demo.searchstax.com/docs/wp-content/uploads/2024/06/image-29-300x185.png 300w, https://demo.searchstax.com/docs/wp-content/uploads/2024/06/image-29-768x473.png 768w, https://demo.searchstax.com/docs/wp-content/uploads/2024/06/image-29.png 1040w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>



<p>Click <strong>Continue</strong>. This takes you to PingFederate Sign-in page. After you authenticate, it brings you back to your SearchStax Dashboard.</p>



<p>Alternately, you can directly go to <strong>https://&lt;Subdomain&gt;.searchstax.com</strong> to login, and clicking on the “Sign-In With your ID Provider” will take you directly to PingFederate.</p>



<h2 class="wp-block-heading" id="h-sso-two-factor-authentication"><strong>SSO + Two-factor Authentication</strong></h2>



<p>A User can have SSO and Two-Factor authentication both setup. The 2FA settings for a user will apply to all accounts that the user has access to.</p>



<p>However, for the account that has SSO Setup, while logging in, SearchStax 2FA settings will not apply. In that case, 2FA should be set up at the SSO Provider.</p>



<div class="wp-block-group"><div class="wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained">
<h2 class="wp-block-heading" id="questions">Questions?</h2>



<p>Do not hesitate to contact the <a href="mailto:support@demo.searchstax.com?subject=SearchStax%20Cloud%20Single%20Sign-On%20%28SSO%29%20Azure%20AD" target="_blank" rel="noreferrer noopener">SearchStax Support Desk</a>.</p>
</div></div>
<p>The post <a href="https://demo.searchstax.com/docs/single-sign-on-pingfederate-2/">Single Sign-On &#8211; PingFederate</a> appeared first on <a href="https://demo.searchstax.com/docs">SearchStax Docs</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://demo.searchstax.com/docs/single-sign-on-pingfederate-2/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Single Sign-On &#8211; Azure AD</title>
		<link>https://demo.searchstax.com/docs/searchstax-cloud-single-sign-on/</link>
					<comments>https://demo.searchstax.com/docs/searchstax-cloud-single-sign-on/#comments</comments>
		
		<dc:creator><![CDATA[Bruce]]></dc:creator>
		<pubDate>Mon, 10 May 2021 20:05:02 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Cloud]]></category>
		<guid isPermaLink="false">https://demo.searchstax.com/docs/?p=8925</guid>

					<description><![CDATA[<p>Managed Search Single Sign-On (SSO) Azure AD The SearchStax Managed Search service now offers the ability for customers to set up Single Sign-On (SSO) to let their users log into&#8230; <a class="more-link" href="https://demo.searchstax.com/docs/searchstax-cloud-single-sign-on/">Continue reading <span class="screen-reader-text">Single Sign-On &#8211; Azure AD</span></a></p>
<p>The post <a href="https://demo.searchstax.com/docs/searchstax-cloud-single-sign-on/">Single Sign-On &#8211; Azure AD</a> appeared first on <a href="https://demo.searchstax.com/docs">SearchStax Docs</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<h1 class="wp-block-heading" id="h-managed-search-single-sign-on-sso-azure-ad">Managed Search Single Sign-On (SSO) Azure AD</h1>



<hr class="wp-block-separator has-css-opacity"/>



<p>The SearchStax Managed Search service now offers the ability for customers to set up <strong>Single Sign-On</strong> (SSO) to let their users log into SearchStax apps with a single ID and password that works across multiple software systems.</p>



<p>We use the open standard Security Assertion Markup Language (SAML) to allow identity providers (IdP) to pass authorization credentials to service providers (SP). We use <a href="https://azure.microsoft.com/en-us/solutions/active-directory-sso/" target="_blank" rel="noreferrer noopener">Microsoft Azure Active Directory</a> to implement SSO for SearchStax.</p>



<p>SSO is an add-on SearchStax feature that is purchased separately. If you are interested in SSO, please <a href="https://www.searchstax.com/talk-to-sales/">contact Sales</a>.</p>



<p>The following steps explain how it can be set up for Microsoft Azure Active Directory.</p>



<h2 class="wp-block-heading" id="h-instructions">Instructions</h2>



<p>Once SSO is enabled by SearchStax for your account, the <strong>owner</strong> and/or <strong>admin</strong> can see options to set it up. The options to set up SSO are in the User Preferences screen of the Managed Search Dashboard:</p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="409" src="https://demo.searchstax.com/docs/wp-content/uploads/2024/06/image-30-1024x409.png" alt="" class="wp-image-18955" srcset="https://demo.searchstax.com/docs/wp-content/uploads/2024/06/image-30-1024x409.png 1024w, https://demo.searchstax.com/docs/wp-content/uploads/2024/06/image-30-300x120.png 300w, https://demo.searchstax.com/docs/wp-content/uploads/2024/06/image-30-768x306.png 768w, https://demo.searchstax.com/docs/wp-content/uploads/2024/06/image-30-1536x613.png 1536w, https://demo.searchstax.com/docs/wp-content/uploads/2024/06/image-30-1568x626.png 1568w, https://demo.searchstax.com/docs/wp-content/uploads/2024/06/image-30.png 1624w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>



<p>The first option is the Single Sign-On subdomain. This is a label like <strong>mycompany</strong>, which the system will use to build a URL such as <strong>mycompany.searchstax.com</strong>. </p>



<p>Click <strong>Next</strong> to view the next page of SSO parameters.</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="968" height="285" src="https://demo.searchstax.com/docs/wp-content/uploads/2023/09/image-25.png" alt="" class="wp-image-16349"/></figure>



<p>The &#8220;direct Sign-In URL&#8221; is the URL that your team can use for signing into Managed Search. The other two URLs are discussed below.</p>



<p></p>



<ol start="1" class="wp-block-list">
<li>Go to Azure Active Directory. Select Enterprise Applications, and then click on “New Application.” <img loading="lazy" decoding="async" width="500" height="332" class="wp-image-8908" style="width: 500px;" src="https://demo.searchstax.com/docs/wp-content/uploads/2021/05/image-34.png" alt="Searchstax Single Sign-On" srcset="https://demo.searchstax.com/docs/wp-content/uploads/2021/05/image-34.png 724w, https://demo.searchstax.com/docs/wp-content/uploads/2021/05/image-34-300x199.png 300w" sizes="auto, (max-width: 500px) 100vw, 500px" /></li>



<li>Now Click on “Create your own application.”<img loading="lazy" decoding="async" width="500" height="373" class="wp-image-8909" style="width: 500px;" src="https://demo.searchstax.com/docs/wp-content/uploads/2021/05/image-35.png" alt="Searchstax Single Sign-On" srcset="https://demo.searchstax.com/docs/wp-content/uploads/2021/05/image-35.png 729w, https://demo.searchstax.com/docs/wp-content/uploads/2021/05/image-35-300x224.png 300w" sizes="auto, (max-width: 500px) 100vw, 500px" /></li>



<li>Enter a name for SearchStax application &#8211; say “SearchStaxManagedSolr”, and select the last dropdown “Integrate any application you don’t find in the gallery” and then click on the “Create” button. <img loading="lazy" decoding="async" width="500" height="246" class="wp-image-8910" style="width: 500px;" src="https://demo.searchstax.com/docs/wp-content/uploads/2021/05/image-36.png" alt="Searchstax Single Sign-On" srcset="https://demo.searchstax.com/docs/wp-content/uploads/2021/05/image-36.png 795w, https://demo.searchstax.com/docs/wp-content/uploads/2021/05/image-36-300x148.png 300w, https://demo.searchstax.com/docs/wp-content/uploads/2021/05/image-36-768x378.png 768w" sizes="auto, (max-width: 500px) 100vw, 500px" /></li>



<li>This creates a new Enterprise Application. In the screen that appears, click on the link for <strong>Step 1 &gt; Assign Users and Groups</strong>. Here you can assign which Users/Groups have permission to SearchStaxManagedSolr Enterprise Application. <img loading="lazy" decoding="async" width="800" height="473" class="wp-image-8911" style="width: 800px;" src="https://demo.searchstax.com/docs/wp-content/uploads/2021/05/image-37.png" alt="Searchstax Single Sign-On" srcset="https://demo.searchstax.com/docs/wp-content/uploads/2021/05/image-37.png 1107w, https://demo.searchstax.com/docs/wp-content/uploads/2021/05/image-37-300x177.png 300w, https://demo.searchstax.com/docs/wp-content/uploads/2021/05/image-37-1024x605.png 1024w, https://demo.searchstax.com/docs/wp-content/uploads/2021/05/image-37-768x454.png 768w" sizes="auto, (max-width: 800px) 100vw, 800px" /></li>



<li>Click on “Add user/group” and then follow up to add all the users of groups that you would like to grant access to. <img loading="lazy" decoding="async" width="600" height="355" class="wp-image-8912" style="width: 600px;" src="https://demo.searchstax.com/docs/wp-content/uploads/2021/05/image-38.png" alt="Searchstax Single Sign-On" srcset="https://demo.searchstax.com/docs/wp-content/uploads/2021/05/image-38.png 1112w, https://demo.searchstax.com/docs/wp-content/uploads/2021/05/image-38-300x178.png 300w, https://demo.searchstax.com/docs/wp-content/uploads/2021/05/image-38-1024x606.png 1024w, https://demo.searchstax.com/docs/wp-content/uploads/2021/05/image-38-768x454.png 768w" sizes="auto, (max-width: 600px) 100vw, 600px" /></li>



<li>Once you are done with Step 1, click on the “Get started” link for <strong>Step 2. Setup single sign on</strong>. <img loading="lazy" decoding="async" width="800" height="461" class="wp-image-8913" style="width: 800px;" src="https://demo.searchstax.com/docs/wp-content/uploads/2021/05/image-39.png" alt="Searchstax Single Sign-On" srcset="https://demo.searchstax.com/docs/wp-content/uploads/2021/05/image-39.png 1156w, https://demo.searchstax.com/docs/wp-content/uploads/2021/05/image-39-300x173.png 300w, https://demo.searchstax.com/docs/wp-content/uploads/2021/05/image-39-1024x590.png 1024w, https://demo.searchstax.com/docs/wp-content/uploads/2021/05/image-39-768x442.png 768w" sizes="auto, (max-width: 800px) 100vw, 800px" /></li>



<li>Now select the single sign-on method as “<strong>SAML</strong>.” <img loading="lazy" decoding="async" width="800" height="198" class="wp-image-8914" style="width: 800px;" src="https://demo.searchstax.com/docs/wp-content/uploads/2021/05/image-40.png" alt="Searchstax Single Sign-On" srcset="https://demo.searchstax.com/docs/wp-content/uploads/2021/05/image-40.png 1227w, https://demo.searchstax.com/docs/wp-content/uploads/2021/05/image-40-300x74.png 300w, https://demo.searchstax.com/docs/wp-content/uploads/2021/05/image-40-1024x253.png 1024w, https://demo.searchstax.com/docs/wp-content/uploads/2021/05/image-40-768x190.png 768w, https://demo.searchstax.com/docs/wp-content/uploads/2021/05/image-40-1200x296.png 1200w" sizes="auto, (max-width: 800px) 100vw, 800px" /></li>



<li>It now shows the screen to configure the SAML endpoints: <img loading="lazy" decoding="async" width="800" height="838" class="wp-image-8935" style="width: 800px;" src="https://demo.searchstax.com/docs/wp-content/uploads/2021/05/Pasted-3.png" alt="Searchstax Single Sign-On" srcset="https://demo.searchstax.com/docs/wp-content/uploads/2021/05/Pasted-3.png 978w, https://demo.searchstax.com/docs/wp-content/uploads/2021/05/Pasted-3-286x300.png 286w, https://demo.searchstax.com/docs/wp-content/uploads/2021/05/Pasted-3-768x805.png 768w" sizes="auto, (max-width: 800px) 100vw, 800px" /></li>



<li><mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-accent-color"></mark>Click on Edit on Step 3, and change Signing Option as “Sign SAML assertion” and click “Save.” <img loading="lazy" decoding="async" width="600" height="287" class="wp-image-8916" style="width: 600px;" src="https://demo.searchstax.com/docs/wp-content/uploads/2021/05/image-42.png" alt="Searchstax Single Sign-On" srcset="https://demo.searchstax.com/docs/wp-content/uploads/2021/05/image-42.png 1170w, https://demo.searchstax.com/docs/wp-content/uploads/2021/05/image-42-300x143.png 300w, https://demo.searchstax.com/docs/wp-content/uploads/2021/05/image-42-1024x489.png 1024w, https://demo.searchstax.com/docs/wp-content/uploads/2021/05/image-42-768x367.png 768w" sizes="auto, (max-width: 600px) 100vw, 600px" />The option can be anything else too, but the same setting should then also be chosen in the Managed Search Dashboard in the SSO settings.</li>



<li>Click on Edit button for Step 1 &gt; Basic SAML Configuration.
<ol style="list-style-type:lower-alpha" class="wp-block-list">
<li>Enter the “Metadata URL” that shows on your <a href="https://app.searchstax.com/login?next=/admin/deployment/" target="_blank" rel="noreferrer noopener">https://app.searchstax.com/admin/sso/configure/saml2/</a> page as Identifier (Entity ID). Remove any extra entries and make sure the “default” checkbox is checked.</li>



<li>Enter the Assertion Consumer Service URL as the “Reply URL” as shown below.</li>



<li>Click “Save.” <img loading="lazy" decoding="async" width="800" height="769" class="wp-image-8917" style="width: 800px;" src="https://demo.searchstax.com/docs/wp-content/uploads/2021/05/image-43.png" alt="Searchstax Single Sign-On" srcset="https://demo.searchstax.com/docs/wp-content/uploads/2021/05/image-43.png 782w, https://demo.searchstax.com/docs/wp-content/uploads/2021/05/image-43-300x288.png 300w, https://demo.searchstax.com/docs/wp-content/uploads/2021/05/image-43-768x739.png 768w" sizes="auto, (max-width: 800px) 100vw, 800px" /></li>
</ol>
</li>



<li>Set up Step 2 &gt; User Attributes &amp; Claims. Click on <strong>Edit</strong>. <img loading="lazy" decoding="async" width="600" height="155" class="wp-image-8919" style="width: 600px;" src="https://demo.searchstax.com/docs/wp-content/uploads/2021/05/image-45.png" alt="Searchstax Single Sign-On" srcset="https://demo.searchstax.com/docs/wp-content/uploads/2021/05/image-45.png 1175w, https://demo.searchstax.com/docs/wp-content/uploads/2021/05/image-45-300x78.png 300w, https://demo.searchstax.com/docs/wp-content/uploads/2021/05/image-45-1024x265.png 1024w, https://demo.searchstax.com/docs/wp-content/uploads/2021/05/image-45-768x199.png 768w" sizes="auto, (max-width: 600px) 100vw, 600px" /></li>



<li>Managed Search has roles defined. If your active directory has a field containing a mapping for those roles, click on “Add new claim” and assign “role”. If you do not have a mapping for Managed Search roles, you can leave it as it, and the users will get created with Team Member as the role by default. Those can always be changed later from the Managed Search Dashboard.<br><br>As just an example, we are mapping user.jobtitle field as the “role” as shown below.<br><br>The Unique User Identifier (Name ID) should be mapped to your active directory field that is the email for the users that will use Managed Search. In our case, the default user.userprincipalname contained the information.<img loading="lazy" decoding="async" width="600" height="371" class="wp-image-8920" style="width: 600px;" src="https://demo.searchstax.com/docs/wp-content/uploads/2021/05/Pasted.png" alt="Searchstax Single Sign-On" srcset="https://demo.searchstax.com/docs/wp-content/uploads/2021/05/Pasted.png 1150w, https://demo.searchstax.com/docs/wp-content/uploads/2021/05/Pasted-300x185.png 300w, https://demo.searchstax.com/docs/wp-content/uploads/2021/05/Pasted-1024x633.png 1024w, https://demo.searchstax.com/docs/wp-content/uploads/2021/05/Pasted-768x475.png 768w" sizes="auto, (max-width: 600px) 100vw, 600px" /></li>



<li>Now back on the Managed Search dashboard&#8230;
<ol style="list-style-type:lower-alpha" class="wp-block-list">
<li>Set the “Metadata url” as the “App Federation Metadata Url” shown in Step 3. </li>



<li><mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-accent-color"></mark>Set the “Login Url” as the “Login URL” shown in Step 4.</li>



<li>Set the “Logout Url” as the “Logout URL” shown in Step 4.</li>



<li>Set the “Idp Entity Url” as the “Azure AD Identifier” shown in Step 4. </li>
</ol>
</li>
</ol>



<figure class="wp-block-image size-full"><img decoding="async" src="https://demo.searchstax.com/docs/wp-content/uploads/2023/03/image-30-1024x698.png" alt="" class="wp-image-10548"/></figure>



<h2 class="wp-block-heading" id="h-login-using-sso">Login Using SSO</h2>



<p><a href="https://app.searchstax.com/login" target="_blank" rel="noreferrer noopener">https://app.searchstax.com/</a> now provides a button at the bottom for SSO &#8211; “Sign-In With your ID Provider.” Click this button. </p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="1007" height="611" src="https://demo.searchstax.com/docs/wp-content/uploads/2022/11/image-10.png" alt="" class="wp-image-13587" srcset="https://demo.searchstax.com/docs/wp-content/uploads/2022/11/image-10.png 1007w, https://demo.searchstax.com/docs/wp-content/uploads/2022/11/image-10-300x182.png 300w, https://demo.searchstax.com/docs/wp-content/uploads/2022/11/image-10-768x466.png 768w" sizes="auto, (max-width: 1007px) 100vw, 1007px" /></figure>



<p>Enter the domain that was set up for the client.</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="1012" height="585" src="https://demo.searchstax.com/docs/wp-content/uploads/2022/11/image-11.png" alt="" class="wp-image-13588" srcset="https://demo.searchstax.com/docs/wp-content/uploads/2022/11/image-11.png 1012w, https://demo.searchstax.com/docs/wp-content/uploads/2022/11/image-11-300x173.png 300w, https://demo.searchstax.com/docs/wp-content/uploads/2022/11/image-11-768x444.png 768w" sizes="auto, (max-width: 1012px) 100vw, 1012px" /></figure>



<p>Click <strong>Continue</strong>. This takes you to Azure Sign-in page. After you authenticate, it brings you back to your Managed Search Dashboard.</p>



<p>Alternately, you can directly go to <strong>https://&lt;Subdomain&gt;.searchstax.com</strong> to login, and clicking on the “Sign-In With your ID Provider” will take you directly to Azure Sign In.</p>



<h2 class="wp-block-heading" id="h-sso-two-factor-authentication"><strong>SSO + Two-factor Authentication</strong></h2>



<p>A User can have SSO and Two-Factor authentication both setup. The 2FA settings for a user will apply to all accounts that the user has access to.</p>



<p>However, for the account that has SSO Setup, while logging in, SearchStax 2FA settings will not apply. In that case, 2FA should be set up at the SSO Provider.</p>



<div class="wp-block-group"><div class="wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained">
<h2 class="wp-block-heading" id="questions">Questions?</h2>



<p>Do not hesitate to contact the <a href="mailto:support@demo.searchstax.com?subject=SearchStax%20Cloud%20Single%20Sign-On%20%28SSO%29%20Azure%20AD" target="_blank" rel="noreferrer noopener">SearchStax Support Desk</a>.</p>
</div></div>
<p>The post <a href="https://demo.searchstax.com/docs/searchstax-cloud-single-sign-on/">Single Sign-On &#8211; Azure AD</a> appeared first on <a href="https://demo.searchstax.com/docs">SearchStax Docs</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://demo.searchstax.com/docs/searchstax-cloud-single-sign-on/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>Securing Deployments</title>
		<link>https://demo.searchstax.com/docs/searchstax-cloud-deployment-security/</link>
					<comments>https://demo.searchstax.com/docs/searchstax-cloud-deployment-security/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Mon, 22 Feb 2021 21:41:58 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://demo.searchstax.com/docs/?p=7090</guid>

					<description><![CDATA[<p>Securing Solr Deployments The SearchStax Managed Search service takes the security of your Solr search infrastructure very seriously. We have built-in industry-standard security at the level of the cluster, network&#8230; <a class="more-link" href="https://demo.searchstax.com/docs/searchstax-cloud-deployment-security/">Continue reading <span class="screen-reader-text">Securing Deployments</span></a></p>
<p>The post <a href="https://demo.searchstax.com/docs/searchstax-cloud-deployment-security/">Securing Deployments</a> appeared first on <a href="https://demo.searchstax.com/docs">SearchStax Docs</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<h1 class="wp-block-heading" id="securing-solr-deployments-searchstax">Securing Solr Deployments </h1>



<hr class="wp-block-separator has-css-opacity"/>



<p>The SearchStax Managed Search service takes the security of your Solr search infrastructure very seriously. We have built-in industry-standard security at the level of the cluster, network and SearchStax Managed Search dashboard.</p>



<ul class="wp-block-list">
<li>Industry-standard security at the Solr cluster level and network level.</li>



<li>Environments secured with SSL out-of-the-box using <a href="#solr-basic-authentication">Solr basic authentication</a>.</li>



<li>Custom firewall rules to lock down search infrastructure to a <a href="#ip-filtering">whitelist of IP addresses</a>.</li>



<li><a href="/docs/searchstax-cloud-two-factor-authentication/">Two-Factor Authentication</a> (2FA) to increase log-on security.</li>



<li>Regular quarterly scans to identify and patch any Apache Solr vulnerabilities.</li>
</ul>



<p></p>



<div class="alert alert-success">
<h4>Securing Solr</h4>
<p>For production systems, secure Solr using <a href="#solr-basic-authentication">Basic Authentication</a> and an appropriate range of <a href="#ip-filtering">IP addresses</a></p>
</div>



<div class="alert alert-warning">
<h4>Warning: Site Search Security Settings</h4>
<p>Components of Site Search will run on many different client computers, so the Solr endpoint cannot be shielded by <a href="/docs/searchstax-cloud-deployment-security/#ip-filtering">IP Filtering</a>. Solr&#8217;s IP Filter must be 0.0.0.0/0.</p>
<p>Therefore, Site Search enables <a href="/docs/searchstax-cloud-deployment-security/#solr-basic-authentication">Solr Basic Auth</a> and creates two new Solr user accounts. Your SearchStax Admins will need Solr Basic Auth accounts of their own in order to connect to Solr.
</p></div>



<div class="alert alert-success">
<h4>Securing Zookeeper</h4>
<p>SearchStax requires Zookeeper to be locked down by IP Filters.</p>
<p>See our Help Center page, <em><a href="https://demo.searchstax.com/docs/hc/how-can-i-secure-zookeeper/">How can I Secure Zookeeper?</a></em>
for additional information. </p>
</div>



<div class="alert alert-warning">
<h4>Securing Users</h4>
<p>All SearchStax users log in using their business email address and a strong password. Each user may optionally enable <a alt="SearchStax Two-Factor Authentication" href="/docs/searchstax-cloud-user-roles/#2FA">two-factor authentication</a> as a standard SearchStax feature.</p>
<p>Premium clients may request <a href="https://en.wikipedia.org/wiki/Single_sign-on#Integrated_Windows_Authentication">SAML-based single sign-on (SSO)</a> using Microsoft Azure Active Directory as an add-on service. </p>
</div>



<div class="alert alert-info">
<h4>Advanced Security Options</h4>
<p>For our <a href="https://www.searchstax.com/pricing/">premium customers</a> (Platinum, and Platinum Plus levels) who have high security requirements, we recommend a <a href="/docs/searchstax-cloud-private-aws/">SearchStax Managed Search Private</a> environment with VPC Peering. </p>
<p>Premium customers may also request at-rest encryption for their data files. Please <a href="https://www.searchstax.com/contact-us/">contact us</a> for more information.</p>
</div>



<p>Contents:</p>



<ul class="wp-block-list">
<li><a href="/docs/searchstax-cloud-deployment-security/#cluster-security">Cluster Security</a>
<ul class="wp-block-list">
<li><a href="/docs/searchstax-cloud-deployment-security/#connecting-to-the-cluster">Connecting to the Cluster</a></li>



<li><a href="/docs/searchstax-cloud-deployment-security/#solr-basic-authentication">Solr Basic Authentication</a></li>



<li><a href="#ip-filtering">IP Filtering</a></li>



<li><a href="/docs/searchstax-cloud-deployment-security/#api-keys">API Keys</a></li>



<li><a href="/docs/searchstax-cloud-deployment-security/#searchstax-user-roles">SearchStax User Roles</a></li>
</ul>
</li>



<li><a href="/docs/searchstax-cloud-deployment-security/#activity-log">Activity Log</a></li>
</ul>



<h2 class="wp-block-heading" id="cluster-security">Cluster Security</h2>



<p>You can lock down your clusters as described below.</p>



<h3 class="wp-block-heading" id="connecting-to-the-cluster">Connecting to the Cluster</h3>



<p>SearchStax recommends that you situate your application infrastructure in the same local network as your hosting provider (for example, AWS or Azure). Internal network security for these hosting providers is extremely high and eliminates any chance of a hacker potentially sniffing your network traffic.</p>



<p>If your application is hosted elsewhere, try to host it as close to your search infrastructure as possible. This can be done by choosing the Cloud Provider Region which is closest to your application. This improves both security and performance.</p>



<h3 class="wp-block-heading" id="solr-basic-authentication">Solr Basic Authentication</h3>



<p>You can optionally enable the <a href="https://solr.apache.org/guide/7_5/rule-based-authorization-plugin.html" target="_blank" rel="noreferrer noopener">Solr Basic Authentication Plugin</a> through the SearchStax Managed Search Dashboard. This restricts access to your Solr dashboard and demands authorization for query requests and index updates.</p>



<div class="alert alert-danger">
<h4>Warnings: Effects of Basic Authentication</h4>
<ul>
<li>Enabling/Disabling this feature will suspend service while it restarts
   all of your Solr nodes. <br>
   </li>
<li>Once enabled, Solr will require a <strong>username</strong> and <strong>password</strong> for:<ul>
<li>Opening the Solr Dashboard. </li>
<li>Making a query request (via the <strong>/select</strong> command).</li>
<li>Adding records to the index (via the <strong>/update</strong> command). </li>
</ul>
</li>
<li>When disabled, Solr will delete all existing Solr users. </li>
</ul>
</div>



<p>To enable the Basic Authentication plugin:</p>



<ol class="wp-block-list">
<li>Select the desired Deployment and click the <strong>Security &gt; Auth</strong> option in the menu tree.</li>



<li>Click the <strong>Enable</strong> button. </li>
</ol>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="533" src="https://demo.searchstax.com/docs/wp-content/uploads/2024/06/BasicAuth-1024x533.png" alt="" class="wp-image-18957" srcset="https://demo.searchstax.com/docs/wp-content/uploads/2024/06/BasicAuth-1024x533.png 1024w, https://demo.searchstax.com/docs/wp-content/uploads/2024/06/BasicAuth-300x156.png 300w, https://demo.searchstax.com/docs/wp-content/uploads/2024/06/BasicAuth-768x400.png 768w, https://demo.searchstax.com/docs/wp-content/uploads/2024/06/BasicAuth.png 1200w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>



<ol class="wp-block-list">
<li>Click the <strong>Add User</strong> button.</li>



<li>Add a user, entering the username, password and role (see below). Click <strong>Add</strong>.<img loading="lazy" decoding="async" width="611" height="377" class="wp-image-10051" src="https://demo.searchstax.com/docs/wp-content/uploads/2021/11/adduser.jpg" alt="Searchstax Securing Deployments" srcset="https://demo.searchstax.com/docs/wp-content/uploads/2021/11/adduser.jpg 611w, https://demo.searchstax.com/docs/wp-content/uploads/2021/11/adduser-300x185.jpg 300w" sizes="auto, (max-width: 611px) 100vw, 611px" /></li>
</ol>



<p>Note that Solr user accounts are independent of SearchStax user accounts.</p>



<p>To disable the Authentication and Authorization plugin, click on the <strong>Disable Auth</strong> button and confirm the action. Disabling Basic Auth erases all Solr users. (Again, Solr services will be restarted.)</p>



<p>Solr Basic Authentication provides four user roles:</p>



<ul class="wp-block-list">
<li><strong>Admin</strong> users have full access to the views and tools of the Solr Dashboard. They can query the index from an external location using a <strong>/select</strong> command, and they can load new records into the index using a <strong>/update</strong> command.</li>



<li><strong>Non-Admin</strong> users can enter the Solr Dashboard but cannot view or make changes to the collections.
<ul class="wp-block-list">
<li><strong>Read</strong> users can query the index using /select.</li>



<li><strong>Write</strong> users can add new records to the index using /update.</li>



<li><strong>ReadWrite</strong> users can use both /select and /update.</li>
</ul>
</li>
</ul>



<figure class="wp-block-table table table-bordered table-striped"><table><thead><tr><th><strong>Role</strong></th><th><strong>Solr Dashboard</strong></th><th><strong>/select</strong></th><th><strong>/update</strong></th></tr></thead><tbody><tr><td>Admin</td><td>Full access to all features</td><td>✓</td><td>✓</td></tr><tr><td>Read</td><td>Limited access</td><td>✓</td><td></td></tr><tr><td>Write</td><td>Limited access</td><td></td><td>✓</td></tr><tr><td>ReadWrite</td><td>Limited access</td><td>✓</td><td>✓</td></tr></tbody></table></figure>



<div class="alert alert-info">
<h4>Using /select and /update with Solr Basic Auth</h4>
<p>After enabling Solr authentication, your <strong>/select</strong> and <strong>/update</strong> interactions with
Solr must include the username and password of a Solr user.
<br><br>
For cURL, add the Solr credentials using the <code>-u 'username:password'</code> parameter.<br>
<br>
If your search application doesn&#8217;t use cURL, your &lt;Solr HTTP Endpoint&gt; changes 
from <code>https://machine...</code> to <code>https://user:password@machine...</code>
<br><br>
If you are trying to use Basic Auth credentials from PowerShell, see <a href="https://demo.searchstax.com/docs/hc/basic-auth-credentials-in-powershell/">Basic Auth Credentials in PowerShell</a>.
<br><br>
Connections to Zookeeper remain unchanged. </p>
</div>



<h3 class="wp-block-heading" id="ip-filtering">IP Filtering</h3>



<div class="alert alert-info">
<h4>When Solr or ZooKeeper become Unreachable</h4>
<p>Most IT departments and ISPs issue IP addresses using the <a href="https://en.wikipedia.org/wiki/Dynamic_Host_Configuration_Protocol">Dynamic Host Configuration Protocol (DHCP)</a>.Your workstation&#8217;s IP address can change without warning. When it does, you&#8217;ll have to update your IP filter settings.</p>
</div>



<div class="alert alert-warning">
<h4>Cannot add another IP Filter?</h4>
<p>There is a maximum number of IP Filters per deployment. See <a href="https://demo.searchstax.com/docs/hc/cannot-add-another-ip-filter/">Cannot add another IP Filter</a> for more information.</p>
</div>



<p>You can limit access to a Solr deployment to a list of IP addresses using the <strong>Security &gt; IP Filter</strong> menu.</p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="576" src="https://demo.searchstax.com/docs/wp-content/uploads/2024/06/IPfilter-1024x576.png" alt="" class="wp-image-18959" srcset="https://demo.searchstax.com/docs/wp-content/uploads/2024/06/IPfilter-1024x576.png 1024w, https://demo.searchstax.com/docs/wp-content/uploads/2024/06/IPfilter-300x169.png 300w, https://demo.searchstax.com/docs/wp-content/uploads/2024/06/IPfilter-768x432.png 768w, https://demo.searchstax.com/docs/wp-content/uploads/2024/06/IPfilter.png 1200w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>



<p>You can configure access for Solr+Zookeeper, Solr, and Zookeeper endpoints separately.</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="162" height="116" src="https://demo.searchstax.com/docs/wp-content/uploads/2022/01/image-35.png" alt="Searchstax Securing Deployments" class="wp-image-10560"/></figure>



<p>The addresses are expressed in <a href="https://en.wikipedia.org/wiki/IPv4" target="_blank" rel="noreferrer noopener">IPv4</a> format, using the familiar <a href="https://en.wikipedia.org/wiki/Dot-decimal_notation" target="_blank" rel="noreferrer noopener">dot-decimal notation</a>. Ranges are specified using <a href="https://en.wikipedia.org/wiki/Classless_Inter-Domain_Routing#CIDR_notation" target="_blank" rel="noreferrer noopener">Classless Inter-Domain Routing (CIDR)</a> format.</p>



<p>CIDR notation can be daunting, but note the following three examples of typical CIDR rules:</p>



<ul class="wp-block-list">
<li><strong>0.0.0.0/0</strong> This rule permits unrestricted access to Solr. <em>Any IP address whatsoever may connect, regardless of other filters you have added to the list.</em> (SearchStax Managed Search will refuse to accept this value if you try to enter it for Zookeeper.)</li>



<li><strong>64.118.123.159/32</strong> This rule permits a connection from <em>exactly one</em> IP address.</li>



<li><strong>64.118.123.0/24</strong> This rule allows Solr access from any of the 256 IP addresses on a subnet.</li>
</ul>



<p>The <strong>/n</strong> at the end of each rule is called the <em>prefix length</em>.</p>



<p>To limit access to a specific IP address or IP address range:</p>



<ol class="wp-block-list">
<li>From within a Deployment&#8217;s details page, click on the <strong>Security &gt; IP filter</strong> option.</li>



<li>Click on <strong>Add Row</strong>.</li>



<li>Add a specific IP address in the appropriate field. Note that SearchStax Managed Search can detect your computer&#8217;s IP address. Click <strong>My current IP</strong> to enter it automatically.</li>



<li>Select a service you need to limit access to (Solr+Zookeeper, Solr, or Zookeeper).</li>



<li>It is a Best Practice to enter your name or email in the label field.  </li>



<li>Click <strong>Save changes</strong>.</li>
</ol>



<p>To remove a filter, click on the <strong>X</strong> button and then <strong>Save changes</strong>.</p>



<h3 class="wp-block-heading" id="api-keys">API Keys</h3>



<p>The <strong>Security &gt; API Keys</strong> menu option exposes a table of the deployment&#8217;s <a href="/docs/searchstax-cloud-authentication-api/#key/">API Keys</a>.</p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="541" src="https://demo.searchstax.com/docs/wp-content/uploads/2024/06/APIkey-1024x541.png" alt="" class="wp-image-18960" srcset="https://demo.searchstax.com/docs/wp-content/uploads/2024/06/APIkey-1024x541.png 1024w, https://demo.searchstax.com/docs/wp-content/uploads/2024/06/APIkey-300x159.png 300w, https://demo.searchstax.com/docs/wp-content/uploads/2024/06/APIkey-768x406.png 768w, https://demo.searchstax.com/docs/wp-content/uploads/2024/06/APIkey.png 1200w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>



<div class="alert alert-info">
<h4>Ease-of-use Feature</h4>
<p>Note a subtle ease-of-use feature here: This is the only place in the SearchStax Managed Search Dashboard where you can mark/copy the <strong>API Key</strong>, the <strong>Account Name</strong>, and the <strong>Deployment ssID Number</strong>. These values are heavily used in the <a href="../staxapi2/">SearchStax API</a>.  </p>
</div>



<h3 class="wp-block-heading" id="searchstax-user-roles">SearchStax User Roles</h3>



<p>Each SearchStax account is restricted to the Owner of that account plus any SearchStax users who have been granted access to that account by the owner. The additional users may be limited to specific roles at the Owner&#8217;s discretion. See <a href="/docs/searchstax-cloud-user-roles/#userroles/">SearchStax User Roles</a>.</p>



<h2 class="wp-block-heading" id="activity-log">Activity Log</h2>



<p>The SearchStax Managed Search <a href="/docs/searchstax-cloud-log-files/#activity">activity log</a> provides you with a list of all user actions within your account, including those of the SearchStax Support team. The list consists of a User column including email of the user who performed the logged change, his/her role, Timestamp of action in UTC, Action itself, Action detail and IP address where the action originated.</p>



<div class="wp-block-group"><div class="wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained">
<h2 class="wp-block-heading" id="questions">Questions?</h2>



<p>Do not hesitate to contact the <a href="mailto:support@demo.searchstax.com?subject=Securing%20Solr%20Deployments%20with%20SearchStax%20Cloud" target="_blank" rel="noreferrer noopener">SearchStax Support Desk</a>.</p>
</div></div>
<p>The post <a href="https://demo.searchstax.com/docs/searchstax-cloud-deployment-security/">Securing Deployments</a> appeared first on <a href="https://demo.searchstax.com/docs">SearchStax Docs</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://demo.searchstax.com/docs/searchstax-cloud-deployment-security/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
