<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>SearchStudio Security Archives - SearchStax Docs</title>
	<atom:link href="https://demo.searchstax.com/docs/searchstudio_categories/searchstudio-security/feed/" rel="self" type="application/rss+xml" />
	<link></link>
	<description>Documentation</description>
	<lastBuildDate>Fri, 21 Mar 2025 14:46:07 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.1</generator>

<image>
	<url>https://demo.searchstax.com/docs/wp-content/uploads/2023/10/cropped-favicon-32x32.png</url>
	<title>SearchStudio Security Archives - SearchStax Docs</title>
	<link></link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Security Overview</title>
		<link>https://demo.searchstax.com/docs/searchstudio/security-overview/</link>
		
		<dc:creator><![CDATA[Bruce]]></dc:creator>
		<pubDate>Mon, 22 May 2023 17:18:03 +0000</pubDate>
				<guid isPermaLink="false">https://demo.searchstax.com/docs/?post_type=searchstudio&#038;p=15458</guid>

					<description><![CDATA[<p>Site Search Security Overview Site Search > Account Menu > My Profile SearchStax Site Search solution offers several ways to increase the security of your search application: Questions? Do not&#8230; <a class="more-link" href="https://demo.searchstax.com/docs/searchstudio/security-overview/">Continue reading <span class="screen-reader-text">Security Overview</span></a></p>
<p>The post <a href="https://demo.searchstax.com/docs/searchstudio/security-overview/">Security Overview</a> appeared first on <a href="https://demo.searchstax.com/docs">SearchStax Docs</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<h1 class="wp-block-heading" id="h-site-search-security-overview">Site Search Security Overview</h1>



<p><strong>Site Search > Account Menu > My Profile</strong></p>



<hr class="wp-block-separator has-css-opacity"/>



<p>SearchStax Site Search solution offers several ways to increase the security of your search application:</p>



<ul class="wp-block-list">
<li><a href="https://demo.searchstax.com/docs/searchstudio/searchstax-studio-change-password/">Change Password</a> &#8211; see how to change your Site Search password</li>



<li><a href="https://demo.searchstax.com/docs/searchstudio/searchstax-studio-two-factor-authentication/">Two-Factor Authentication (2FA)</a> &#8211; increase security with Two-Factor Authentication</li>



<li><a href="https://demo.searchstax.com/docs/searchstudio/searchstax-studio-single-sign-on/">Single Sign-On (SSO)</a> &#8211; learn more about Single Sign-On for Site Search
<ul class="wp-block-list">
<li><a href="https://demo.searchstax.com/docs/searchstudio/single-sign-on-okta/">Single Sign-On &#8211; Okta</a></li>



<li><a href="https://demo.searchstax.com/docs/searchstudio/single-sign-on-onelogin/">Single Sign-On &#8211; OneLogin</a></li>



<li><a href="https://demo.searchstax.com/docs/searchstudio/single-sign-on-pingfederate/">Single Sign-On &#8211; PingFederate</a></li>



<li><a href="https://demo.searchstax.com/docs/searchstudio/single-sign-on-azure-ad-2/">Single Sign-On &#8211; Azure AD</a></li>
</ul>
</li>
</ul>



<div class="wp-block-group"><div class="wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained">
<h2 class="wp-block-heading" id="questions">Questions?</h2>



<p>Do not hesitate to contact the <a href="mailto:support@demo.searchstax.com?subject=Site%20Search%20Security%20Overview" target="_blank" rel="noreferrer noopener">SearchStax Support Desk</a>.</p>
</div></div>



<p></p>
<p>The post <a href="https://demo.searchstax.com/docs/searchstudio/security-overview/">Security Overview</a> appeared first on <a href="https://demo.searchstax.com/docs">SearchStax Docs</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Change Your Password</title>
		<link>https://demo.searchstax.com/docs/searchstudio/searchstax-studio-change-password/</link>
		
		<dc:creator><![CDATA[Bruce]]></dc:creator>
		<pubDate>Tue, 06 Apr 2021 18:18:23 +0000</pubDate>
				<guid isPermaLink="false">https://demo.searchstax.com/docs/?post_type=site_search&#038;p=8532</guid>

					<description><![CDATA[<p>Change Your Password Site Search &#62; Account Menu &#62; My Profile There are multiple ways to change a password in the SearchStax Site Search solution depending on context. If you&#8230; <a class="more-link" href="https://demo.searchstax.com/docs/searchstudio/searchstax-studio-change-password/">Continue reading <span class="screen-reader-text">Change Your Password</span></a></p>
<p>The post <a href="https://demo.searchstax.com/docs/searchstudio/searchstax-studio-change-password/">Change Your Password</a> appeared first on <a href="https://demo.searchstax.com/docs">SearchStax Docs</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<h1 class="wp-block-heading" id="h-change-your-password">Change Your Password</h1>



<p><strong>Site Search &gt; Account Menu &gt; My Profile</strong></p>



<hr class="wp-block-separator has-css-opacity"/>



<p>There are multiple ways to change a password in the SearchStax Site Search solution depending on context.</p>



<p>If you are locked out of your SearchStax account, use the <a href="/docs/searchstax-cloud-deployment-security/#solr-basic-authentication">Forgot Password</a> link on the login page.</p>



<figure class="wp-block-image size-full"><img fetchpriority="high" decoding="async" width="805" height="565" src="https://demo.searchstax.com/docs/wp-content/uploads/2021/04/image-45.png" alt="" class="wp-image-20524" srcset="https://demo.searchstax.com/docs/wp-content/uploads/2021/04/image-45.png 805w, https://demo.searchstax.com/docs/wp-content/uploads/2021/04/image-45-300x211.png 300w, https://demo.searchstax.com/docs/wp-content/uploads/2021/04/image-45-768x539.png 768w" sizes="(max-width: 805px) 100vw, 805px" /></figure>



<p>If you should need to change your own password because it is about to expire, pull down the <strong>Accounts</strong> menu in the upper-right corner of the Site Search and select <strong>My Profile</strong>. </p>


<div class="wp-block-image">
<figure class="aligncenter size-full"><img decoding="async" width="307" height="249" src="https://demo.searchstax.com/docs/wp-content/uploads/2021/04/image-46.png" alt="" class="wp-image-20526" srcset="https://demo.searchstax.com/docs/wp-content/uploads/2021/04/image-46.png 307w, https://demo.searchstax.com/docs/wp-content/uploads/2021/04/image-46-300x243.png 300w" sizes="(max-width: 307px) 100vw, 307px" /></figure></div>


<p>On the <strong>My Profile</strong> screen, you can edit the user&#8217;s first and last names, and you can view the associated email address. One cannot change the email address, since that is the SearchStax user&#8217;s unique ID. (Changing the email requires the assistance of the <a href="/docs/hc/file-support-ticket/">SearchStax Support Desk</a>.)</p>



<p>To change the password, click the <strong>Edit Credentials</strong> button.   </p>



<figure class="wp-block-image size-large"><img decoding="async" width="1024" height="876" src="https://demo.searchstax.com/docs/wp-content/uploads/2021/04/image-48-1024x876.png" alt="" class="wp-image-20528" srcset="https://demo.searchstax.com/docs/wp-content/uploads/2021/04/image-48-1024x876.png 1024w, https://demo.searchstax.com/docs/wp-content/uploads/2021/04/image-48-300x257.png 300w, https://demo.searchstax.com/docs/wp-content/uploads/2021/04/image-48-768x657.png 768w, https://demo.searchstax.com/docs/wp-content/uploads/2021/04/image-48.png 1214w" sizes="(max-width: 1024px) 100vw, 1024px" /></figure>



<div class="wp-block-group"><div class="wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained">
<h2 class="wp-block-heading" id="questions">Questions?</h2>



<p>Do not hesitate to contact the <a href="mailto:support@demo.searchstax.com?subject=Studio%3A%20Change%20Your%20Password" target="_blank" rel="noreferrer noopener">SearchStax Support Desk</a>.</p>
</div></div>
<p>The post <a href="https://demo.searchstax.com/docs/searchstudio/searchstax-studio-change-password/">Change Your Password</a> appeared first on <a href="https://demo.searchstax.com/docs">SearchStax Docs</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Two-Factor Authentication</title>
		<link>https://demo.searchstax.com/docs/searchstudio/searchstax-studio-two-factor-authentication/</link>
		
		<dc:creator><![CDATA[Bruce]]></dc:creator>
		<pubDate>Wed, 14 Apr 2021 22:27:45 +0000</pubDate>
				<guid isPermaLink="false">https://demo.searchstax.com/docs/?post_type=site_search&#038;p=8624</guid>

					<description><![CDATA[<p>Two-Factor Authentication Site Search &#62; Account Menu &#62; My Profile All SearchStax Site Search solution users have the option of enabling Two-Factor Authentication (TFA) using the Google Authenticator. Pull down&#8230; <a class="more-link" href="https://demo.searchstax.com/docs/searchstudio/searchstax-studio-two-factor-authentication/">Continue reading <span class="screen-reader-text">Two-Factor Authentication</span></a></p>
<p>The post <a href="https://demo.searchstax.com/docs/searchstudio/searchstax-studio-two-factor-authentication/">Two-Factor Authentication</a> appeared first on <a href="https://demo.searchstax.com/docs">SearchStax Docs</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<h1 class="wp-block-heading" id="h-two-factor-authentication">Two-Factor Authentication</h1>



<p><strong>Site Search &gt; Account Menu &gt; My Profile</strong></p>



<hr class="wp-block-separator has-css-opacity"/>



<p>All SearchStax Site Search solution users have the option of enabling Two-Factor Authentication (TFA) using the <a href="https://en.wikipedia.org/wiki/Google_Authenticator">Google Authenticator</a>. Pull down the <strong>Accounts</strong> menu in the upper-right corner of the Site Search and select <strong>My Profile</strong>. </p>


<div class="wp-block-image">
<figure class="aligncenter size-full"><img loading="lazy" decoding="async" width="307" height="249" src="https://demo.searchstax.com/docs/wp-content/uploads/2021/04/image-49.png" alt="" class="wp-image-20530" srcset="https://demo.searchstax.com/docs/wp-content/uploads/2021/04/image-49.png 307w, https://demo.searchstax.com/docs/wp-content/uploads/2021/04/image-49-300x243.png 300w" sizes="auto, (max-width: 307px) 100vw, 307px" /></figure></div>


<p>If you scroll down to the lower part of the <strong>My Profile</strong> screen, Site Search offers you the option of using <strong>Two-Factor Authentication</strong>.</p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="672" height="177" src="https://demo.searchstax.com/docs/wp-content/uploads/2021/04/image-3.png" alt="" class="wp-image-8533" srcset="https://demo.searchstax.com/docs/wp-content/uploads/2021/04/image-3.png 672w, https://demo.searchstax.com/docs/wp-content/uploads/2021/04/image-3-300x79.png 300w" sizes="auto, (max-width: 672px) 100vw, 672px" /></figure>



<p>The setup procedure is simple. Click the <strong>Set Up Google Authenticator</strong> button to generate the <a href="https://en.wikipedia.org/wiki/QR_code">QR code</a> on this screen:</p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="630" height="591" src="https://demo.searchstax.com/docs/wp-content/uploads/2021/04/image-4.png" alt="Site Search helps you set up two-factor authentication with the Google Authenticator service. " class="wp-image-8534" srcset="https://demo.searchstax.com/docs/wp-content/uploads/2021/04/image-4.png 630w, https://demo.searchstax.com/docs/wp-content/uploads/2021/04/image-4-300x281.png 300w" sizes="auto, (max-width: 630px) 100vw, 630px" /></figure>



<p>Install the <strong>Google Authenticator</strong> app on your phone or tablet and use it to scan the QR code. Once the link to SearchStax is verified (which is almost instantaneous), the phone app begins to display six-digit numbers.</p>



<p>When you log into SearchStax, enter your email address and strong password as usual. SearchStax will open a field for your six-digit code. This code changes once each minute, so it is a very secure way to authenticate.</p>



<p>Note that Site Search displays a screen of one-time Backup Verification Codes that you can use if you lose your phone. We recommend that you store these codes in a safe place.</p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="807" height="343" src="https://demo.searchstax.com/docs/wp-content/uploads/2021/05/image-24.png" alt="" class="wp-image-8886" srcset="https://demo.searchstax.com/docs/wp-content/uploads/2021/05/image-24.png 807w, https://demo.searchstax.com/docs/wp-content/uploads/2021/05/image-24-300x128.png 300w, https://demo.searchstax.com/docs/wp-content/uploads/2021/05/image-24-768x326.png 768w" sizes="auto, (max-width: 807px) 100vw, 807px" /></figure>



<p>It is possible to disable Two-Factor Authentication from this same Profile screen, should you need to do so. </p>



<div class="wp-block-group"><div class="wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained">
<h2 class="wp-block-heading" id="questions">Questions?</h2>



<p>Do not hesitate to contact the <a href="mailto:support@demo.searchstax.com?subject=Studio%3A%20Two-Factor%20Authentication" target="_blank" rel="noreferrer noopener">SearchStax Support Desk</a>.</p>
</div></div>
<p>The post <a href="https://demo.searchstax.com/docs/searchstudio/searchstax-studio-two-factor-authentication/">Two-Factor Authentication</a> appeared first on <a href="https://demo.searchstax.com/docs">SearchStax Docs</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Single Sign-On</title>
		<link>https://demo.searchstax.com/docs/searchstudio/searchstax-studio-single-sign-on/</link>
		
		<dc:creator><![CDATA[Bruce]]></dc:creator>
		<pubDate>Tue, 05 Oct 2021 18:01:43 +0000</pubDate>
				<guid isPermaLink="false">https://demo.searchstax.com/docs/?post_type=searchstudio&#038;p=9859</guid>

					<description><![CDATA[<p>Single Sign-On (SSO) Authentication Site Search &#62; Account Menu &#62; My Profile The SearchStax Site Search solution now offers the ability for clients to set up Single Sign-On (SSO) using&#8230; <a class="more-link" href="https://demo.searchstax.com/docs/searchstudio/searchstax-studio-single-sign-on/">Continue reading <span class="screen-reader-text">Single Sign-On</span></a></p>
<p>The post <a href="https://demo.searchstax.com/docs/searchstudio/searchstax-studio-single-sign-on/">Single Sign-On</a> appeared first on <a href="https://demo.searchstax.com/docs">SearchStax Docs</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<h1 class="wp-block-heading" id="h-single-sign-on-sso-authentication">Single Sign-On (SSO) Authentication</h1>



<p><strong>Site Search &gt; Account Menu &gt; My Profile</strong></p>



<hr class="wp-block-separator has-css-opacity"/>



<p>The SearchStax Site Search solution now offers the ability for clients to set up <strong>Single Sign-On</strong> (SSO) using the Security Assertion Markup Language (SAML), which is an open standard that allows identity providers (IdP) to pass authorization credentials to service providers (SP).</p>



<p>SSO is an add-on Site Search feature that needs to be purchased. If you are interested in this feature, please contact us <a href="https://www.searchstax.com/contact-us/">here</a>. The SSO features of the Site Search will not appear until we have authorized the feature in your account.</p>



<p>Pull down the <strong>Accounts</strong> menu in the upper-right corner of Site Search and select <strong>My Profile</strong>. </p>


<div class="wp-block-image">
<figure class="aligncenter size-full"><img loading="lazy" decoding="async" width="307" height="249" src="https://demo.searchstax.com/docs/wp-content/uploads/2021/10/image-36.png" alt="" class="wp-image-20533" srcset="https://demo.searchstax.com/docs/wp-content/uploads/2021/10/image-36.png 307w, https://demo.searchstax.com/docs/wp-content/uploads/2021/10/image-36-300x243.png 300w" sizes="auto, (max-width: 307px) 100vw, 307px" /></figure></div>


<p>If you scroll down to the lower part of the <strong>My Profile</strong> screen, the Site Search offers you the option of using <strong>Single Sign-On</strong>.</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="651" height="174" src="https://demo.searchstax.com/docs/wp-content/uploads/2021/10/image-10.png" alt="" class="wp-image-9855" srcset="https://demo.searchstax.com/docs/wp-content/uploads/2021/10/image-10.png 651w, https://demo.searchstax.com/docs/wp-content/uploads/2021/10/image-10-300x80.png 300w" sizes="auto, (max-width: 651px) 100vw, 651px" /></figure>



<p>Click the button to view a page of SSO setup fields. The procedure for setting up this feature is the same as that on <a href="/docs/searchstax-cloud-single-sign-on/">this Managed Search page</a>.</p>



<h2 class="wp-block-heading" id="login-using-sso">Login Using SSO</h2>



<p>https://searchstudio.searchstax.com/ now provides a button at the bottom for SSO &#8211; “Sign-In using your ID Provider.” Click this button.</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="805" height="565" src="https://demo.searchstax.com/docs/wp-content/uploads/2021/10/image-37.png" alt="" class="wp-image-20535" srcset="https://demo.searchstax.com/docs/wp-content/uploads/2021/10/image-37.png 805w, https://demo.searchstax.com/docs/wp-content/uploads/2021/10/image-37-300x211.png 300w, https://demo.searchstax.com/docs/wp-content/uploads/2021/10/image-37-768x539.png 768w" sizes="auto, (max-width: 805px) 100vw, 805px" /></figure>



<p></p>



<p>Enter the domain that was set up for the client.</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="822" height="533" src="https://demo.searchstax.com/docs/wp-content/uploads/2024/05/image-21.png" alt="" class="wp-image-18869" srcset="https://demo.searchstax.com/docs/wp-content/uploads/2024/05/image-21.png 822w, https://demo.searchstax.com/docs/wp-content/uploads/2024/05/image-21-300x195.png 300w, https://demo.searchstax.com/docs/wp-content/uploads/2024/05/image-21-768x498.png 768w" sizes="auto, (max-width: 822px) 100vw, 822px" /></figure>



<p>Click <strong>Continue</strong>. This takes you to your Azure Sign-in page. After you authenticate, it brings you back to Site Search.</p>



<p>Alternately, you can directly go to https://&lt;Subdomain&gt;.searchstax.com to login, and clicking on the “Sign-In With your ID Provider” will take you directly to Azure Sign In.</p>



<h2 class="wp-block-heading" id="sso-two-factor-authentication"><strong>SSO + Two-factor Authentication</strong></h2>



<p>A User can have SSO and Two-Factor authentication both set up. The 2FA settings for a user will apply to all accounts that the user has access to.</p>



<p>However, for the account that has SSO Setup, while logging in, SearchStax 2FA settings will not apply. In that case, 2FA should be set up at the SSO Provider.</p>



<div class="wp-block-group"><div class="wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained">
<h2 class="wp-block-heading" id="questions">Questions?</h2>



<p>Do not hesitate to contact the <a href="mailto:support@demo.searchstax.com?subject=Studio%3A%20Single%20Sign-On" target="_blank" rel="noreferrer noopener">SearchStax Support Desk</a>.</p>
</div></div>
<p>The post <a href="https://demo.searchstax.com/docs/searchstudio/searchstax-studio-single-sign-on/">Single Sign-On</a> appeared first on <a href="https://demo.searchstax.com/docs">SearchStax Docs</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Single Sign-On &#8211; Okta</title>
		<link>https://demo.searchstax.com/docs/searchstudio/single-sign-on-okta/</link>
		
		<dc:creator><![CDATA[Tom Humbarger]]></dc:creator>
		<pubDate>Sat, 12 Nov 2022 08:16:42 +0000</pubDate>
				<guid isPermaLink="false">https://demo.searchstax.com/docs/?post_type=searchstudio&#038;p=13684</guid>

					<description><![CDATA[<p>SearchStax Site Search Single Sign-On (SSO) Setup for Okta The SearchStax Site Search solution now offers the ability for customers to set up Single Sign-On (SSO) to let their users&#8230; <a class="more-link" href="https://demo.searchstax.com/docs/searchstudio/single-sign-on-okta/">Continue reading <span class="screen-reader-text">Single Sign-On &#8211; Okta</span></a></p>
<p>The post <a href="https://demo.searchstax.com/docs/searchstudio/single-sign-on-okta/">Single Sign-On &#8211; Okta</a> appeared first on <a href="https://demo.searchstax.com/docs">SearchStax Docs</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<h1 class="wp-block-heading" id="h-searchstax-site-search-single-sign-on-sso-setup-for-okta">SearchStax Site Search Single Sign-On (SSO) Setup for Okta</h1>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<p>The SearchStax Site Search solution now offers the ability for customers to set up <strong>Single Sign-On</strong> (SSO) to let their users log into SearchStax apps with a single ID and password that works across multiple software systems.</p>



<p>We use the open standard Security Assertion Markup Language (SAML) to allow identity providers (IdP) to pass authorization credentials to service providers (SP). This page provides instruction to use <a href="https://www.okta.com/">Okta</a> to implement SSO for SearchStax.</p>



<p>SSO is an add-on SearchStax feature that is purchased separately. If you are interested in SSO, please <a href="https://www.searchstax.com/talk-to-sales/">contact Sales</a> or your Account Manager.</p>



<p>Once SSO is enabled for your account and a domain is set up, the admin is able to see the configuration options in the User Preferences screen of the Site Search Dashboard.</p>



<p>The following steps explain how it can be set up for Okta.</p>



<h2 class="wp-block-heading" id="h-instructions">Instructions</h2>



<p>Once SSO is enabled by SearchStax for your account, and a domain is set up, the options to set up SSO appear in the <strong>My Profile</strong> screen of the <strong>My Account</strong> menu:</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="880" height="560" src="https://demo.searchstax.com/docs/wp-content/uploads/2022/11/image-53.png" alt="" class="wp-image-20539" srcset="https://demo.searchstax.com/docs/wp-content/uploads/2022/11/image-53.png 880w, https://demo.searchstax.com/docs/wp-content/uploads/2022/11/image-53-300x191.png 300w, https://demo.searchstax.com/docs/wp-content/uploads/2022/11/image-53-768x489.png 768w" sizes="auto, (max-width: 880px) 100vw, 880px" /></figure>



<p>The <strong>Set Up Single Sign-On</strong> button leads to a screen of configuration URLs and feature options. You will need to refer to this screen while setting up the SSO profile with the Identity Provider. </p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="718" height="1024" src="https://demo.searchstax.com/docs/wp-content/uploads/2024/10/image-18-718x1024.png" alt="" class="wp-image-19953" srcset="https://demo.searchstax.com/docs/wp-content/uploads/2024/10/image-18-718x1024.png 718w, https://demo.searchstax.com/docs/wp-content/uploads/2024/10/image-18-210x300.png 210w, https://demo.searchstax.com/docs/wp-content/uploads/2024/10/image-18.png 763w" sizes="auto, (max-width: 718px) 100vw, 718px" /></figure>



<p>This screen contains the following fields and options:</p>



<ul class="wp-block-list">
<li><strong>Assertion Consumer Service (ACS) URL:</strong> Note that the URL includes your SSO domain (called <strong>mydomain</strong> in the following discussion).</li>



<li><strong>Metadata URL:</strong> SearchStax metadata endpoint.</li>



<li><strong>Enable Checkbox:</strong> If checked, SSO is enabled for this account. </li>



<li><strong>Assertion Responses Signed:</strong> Use the droplist to indicate whether assertions and/or responses should be signed. </li>



<li><strong>Allow Email Password Login Checkbox:</strong> If check, permits login by email/password in addition to SSO.</li>



<li><strong>Auto Create Users Checkbox:</strong> Should a new user account be created the first time a user logs in?</li>



<li><strong>IDP Entry URL:</strong> Identity provider URL.  </li>



<li><strong>Metadata URL:</strong> The SAML 2 Metadata URL.</li>



<li><strong>Sign-In URL:</strong> The URL used for signing into the SAMP Identity Provider. </li>



<li><strong>Sign-Out URL (Optional):</strong> The URL shown after a successful sign-out.</li>
</ul>



<h2 class="wp-block-heading" id="h-okta-setup">Okta Setup</h2>



<p><strong>1.</strong> You need to be an Admin in Okta to set up the SearchStax Application. </p>



<p><strong>2.</strong>  Go to the Okta Admin Console. Click on Applications &gt; &#8220;Create App Integration&#8221;. Select &#8220;SAML 2.0&#8221; and click on &#8220;Next&#8221;</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="952" height="558" src="https://demo.searchstax.com/docs/wp-content/uploads/2022/11/Screenshot-2022-11-07-at-4.50.05-PM.png" alt="" class="wp-image-13551" srcset="https://demo.searchstax.com/docs/wp-content/uploads/2022/11/Screenshot-2022-11-07-at-4.50.05-PM.png 952w, https://demo.searchstax.com/docs/wp-content/uploads/2022/11/Screenshot-2022-11-07-at-4.50.05-PM-300x176.png 300w, https://demo.searchstax.com/docs/wp-content/uploads/2022/11/Screenshot-2022-11-07-at-4.50.05-PM-768x450.png 768w" sizes="auto, (max-width: 952px) 100vw, 952px" /></figure>



<p><strong>3.</strong> Enter the name of the App  as &#8220;SearchStax Studio&#8221; and click on Next</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="733" height="523" src="https://demo.searchstax.com/docs/wp-content/uploads/2022/11/image-47.png" alt="" class="wp-image-13704" srcset="https://demo.searchstax.com/docs/wp-content/uploads/2022/11/image-47.png 733w, https://demo.searchstax.com/docs/wp-content/uploads/2022/11/image-47-300x214.png 300w" sizes="auto, (max-width: 733px) 100vw, 733px" /></figure>



<p><strong>4.</strong> Configure the SAML Settings with the following information:</p>



<ul class="wp-block-list">
<li>Set the “Single sign on URL” as the Assertion Consumer Service URL provided in Site Search</li>



<li>Check on &#8220;Use this for Recipient URL and Destination URL&#8221;</li>



<li>Set the &#8220;Audience URI&#8221;as the Metadata URL provided in Site Search</li>



<li>Set the &#8220;Name ID format&#8221; as &#8220;Unspecified&#8221;</li>



<li>Set the &#8220;Application username&#8221; as &#8220;Email&#8221;</li>



<li>Set the &#8220;Update application username on&#8221; as &#8220;Create and update&#8221;</li>
</ul>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="977" height="979" src="https://demo.searchstax.com/docs/wp-content/uploads/2022/11/image-41.png" alt="" class="wp-image-13697" srcset="https://demo.searchstax.com/docs/wp-content/uploads/2022/11/image-41.png 977w, https://demo.searchstax.com/docs/wp-content/uploads/2022/11/image-41-300x300.png 300w, https://demo.searchstax.com/docs/wp-content/uploads/2022/11/image-41-150x150.png 150w, https://demo.searchstax.com/docs/wp-content/uploads/2022/11/image-41-768x770.png 768w" sizes="auto, (max-width: 977px) 100vw, 977px" /></figure>



<p><strong>5.</strong> Click on &#8220;Show Advanced Settings&#8221; and set &#8220;Response&#8221; and &#8220;Assertion Signature&#8221; to &#8220;Signed&#8221;. Below is a sample of Advanced Settings</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="576" height="721" src="https://demo.searchstax.com/docs/wp-content/uploads/2022/11/Screenshot-2022-11-07-at-5.03.42-PM.png" alt="" class="wp-image-13557" srcset="https://demo.searchstax.com/docs/wp-content/uploads/2022/11/Screenshot-2022-11-07-at-5.03.42-PM.png 576w, https://demo.searchstax.com/docs/wp-content/uploads/2022/11/Screenshot-2022-11-07-at-5.03.42-PM-240x300.png 240w" sizes="auto, (max-width: 576px) 100vw, 576px" /></figure>



<p>*If you change the response and assertion settings, you will need to also change the Site Search &#8220;Assertions responses signed*&#8221; setting to match.</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="544" height="90" src="https://demo.searchstax.com/docs/wp-content/uploads/2022/11/image-42.png" alt="" class="wp-image-13698" srcset="https://demo.searchstax.com/docs/wp-content/uploads/2022/11/image-42.png 544w, https://demo.searchstax.com/docs/wp-content/uploads/2022/11/image-42-300x50.png 300w" sizes="auto, (max-width: 544px) 100vw, 544px" /></figure>



<p><strong>6.</strong> The next section provides Attribute Statements for mapping Okta fields to SearchStax. Below are sample mappings that we defined</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="623" height="694" src="https://demo.searchstax.com/docs/wp-content/uploads/2022/11/Screenshot-2022-11-07-at-5.05.04-PM.png" alt="" class="wp-image-13558" srcset="https://demo.searchstax.com/docs/wp-content/uploads/2022/11/Screenshot-2022-11-07-at-5.05.04-PM.png 623w, https://demo.searchstax.com/docs/wp-content/uploads/2022/11/Screenshot-2022-11-07-at-5.05.04-PM-269x300.png 269w" sizes="auto, (max-width: 623px) 100vw, 623px" /></figure>



<p>The above example assigns the role of &#8220;Admin&#8221; to all users in Site Search. However, if you have a different field in Okta that maps the role, you can assign that field instead.</p>



<p>Click on Next.</p>



<p><strong>7.</strong> Select &#8220;I&#8217;m an Okta customer adding an internal app&#8221; and click on &#8220;Finish&#8221;</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="856" height="426" src="https://demo.searchstax.com/docs/wp-content/uploads/2022/11/Screenshot-2022-11-07-at-5.06.58-PM.png" alt="" class="wp-image-13559" srcset="https://demo.searchstax.com/docs/wp-content/uploads/2022/11/Screenshot-2022-11-07-at-5.06.58-PM.png 856w, https://demo.searchstax.com/docs/wp-content/uploads/2022/11/Screenshot-2022-11-07-at-5.06.58-PM-300x149.png 300w, https://demo.searchstax.com/docs/wp-content/uploads/2022/11/Screenshot-2022-11-07-at-5.06.58-PM-768x382.png 768w" sizes="auto, (max-width: 856px) 100vw, 856px" /></figure>



<p><strong>8.</strong> Now click on the &#8220;View SAML setup instructions&#8221; button that is displayed to the right</p>



<p></p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="811" height="801" src="https://demo.searchstax.com/docs/wp-content/uploads/2022/11/image-48.png" alt="" class="wp-image-13705" srcset="https://demo.searchstax.com/docs/wp-content/uploads/2022/11/image-48.png 811w, https://demo.searchstax.com/docs/wp-content/uploads/2022/11/image-48-300x296.png 300w, https://demo.searchstax.com/docs/wp-content/uploads/2022/11/image-48-768x759.png 768w" sizes="auto, (max-width: 811px) 100vw, 811px" /></figure>



<p><strong>9.</strong> Copy the &#8220;Identity Provider Single Sign-On URL&#8221; from the screen and set it as the Login url in Site Search.</p>



<p><strong>10.</strong> Copy the &#8220;Identity Provider Issuer&#8221; from the screen and set it as the Idp entity url in Site Search.</p>



<p><strong>11.</strong> Copy the XML shown in the <strong>Optional section</strong> with the title &#8220;Provide the following IDP metadata to your SP Provider&#8221; and host it on a URL (optionally, you can send it to us and we can host this for you). Copy this hosted IDP metadata URL and set it as the Metadata url in Site Search.</p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="638" src="https://demo.searchstax.com/docs/wp-content/uploads/2022/11/image-49-1024x638.png" alt="" class="wp-image-13707" srcset="https://demo.searchstax.com/docs/wp-content/uploads/2022/11/image-49-1024x638.png 1024w, https://demo.searchstax.com/docs/wp-content/uploads/2022/11/image-49-300x187.png 300w, https://demo.searchstax.com/docs/wp-content/uploads/2022/11/image-49-768x479.png 768w, https://demo.searchstax.com/docs/wp-content/uploads/2022/11/image-49.png 1051w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>



<p></p>



<p><strong>12.</strong> Now, set SSO to &#8220;Enabled&#8221;. </p>



<p>When you are testing, also check &#8220;Allow email password login&#8221; (You can turn this off once SSO testing is complete). Here is our example setting page:</p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="674" src="https://demo.searchstax.com/docs/wp-content/uploads/2022/11/image-44-1024x674.png" alt="" class="wp-image-13700" srcset="https://demo.searchstax.com/docs/wp-content/uploads/2022/11/image-44-1024x674.png 1024w, https://demo.searchstax.com/docs/wp-content/uploads/2022/11/image-44-300x197.png 300w, https://demo.searchstax.com/docs/wp-content/uploads/2022/11/image-44-768x505.png 768w, https://demo.searchstax.com/docs/wp-content/uploads/2022/11/image-44.png 1135w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>



<p></p>



<h2 class="wp-block-heading" id="h-login-using-sso">Login Using SSO</h2>



<p>On <a href="https://searchstudio.searchstax.com/login" target="_blank" rel="noreferrer noopener">https://searchstudio.searchstax.com/</a> , click the “Sign-In using your ID provider&#8221; button.</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="795" height="633" src="https://demo.searchstax.com/docs/wp-content/uploads/2024/05/image-20.png" alt="" class="wp-image-18867" srcset="https://demo.searchstax.com/docs/wp-content/uploads/2024/05/image-20.png 795w, https://demo.searchstax.com/docs/wp-content/uploads/2024/05/image-20-300x239.png 300w, https://demo.searchstax.com/docs/wp-content/uploads/2024/05/image-20-768x612.png 768w" sizes="auto, (max-width: 795px) 100vw, 795px" /></figure>



<p></p>



<p>Enter the domain.</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="856" height="564" src="https://demo.searchstax.com/docs/wp-content/uploads/2024/05/image-22.png" alt="" class="wp-image-18872" srcset="https://demo.searchstax.com/docs/wp-content/uploads/2024/05/image-22.png 856w, https://demo.searchstax.com/docs/wp-content/uploads/2024/05/image-22-300x198.png 300w, https://demo.searchstax.com/docs/wp-content/uploads/2024/05/image-22-768x506.png 768w" sizes="auto, (max-width: 856px) 100vw, 856px" /></figure>



<p>Click <strong>Continue</strong>. This takes you to the Okta Sign-in page. After you authenticate, it brings you back to your SearchStax Site Search Dashboard.</p>



<h2 class="wp-block-heading" id="h-sso-two-factor-authentication"><strong>SSO + Two-factor Authentication</strong></h2>



<p>A User can have SSO and Two-Factor authentication both setup. The 2FA settings for a user will apply to all accounts that the user has access to.</p>



<p>However, for the account that has SSO Setup, while logging in, SearchStax 2FA settings will not apply. In that case, 2FA should be set up at the SSO Provider.</p>



<hr class="wp-block-separator has-css-opacity"/>



<div class="wp-block-group"><div class="wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained">
<h2 class="wp-block-heading" id="questions">Questions?</h2>



<p>Do not hesitate to contact the <a href="mailto:support@demo.searchstax.com?subject=Studio%3A%20Single%20Sign-On%20-%20OKTA" target="_blank" rel="noreferrer noopener">SearchStax Support Desk</a>.</p>
</div></div>
<p>The post <a href="https://demo.searchstax.com/docs/searchstudio/single-sign-on-okta/">Single Sign-On &#8211; Okta</a> appeared first on <a href="https://demo.searchstax.com/docs">SearchStax Docs</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Single Sign-On &#8211; OneLogin</title>
		<link>https://demo.searchstax.com/docs/searchstudio/single-sign-on-onelogin/</link>
		
		<dc:creator><![CDATA[Bruce]]></dc:creator>
		<pubDate>Fri, 01 Nov 2024 15:57:38 +0000</pubDate>
				<guid isPermaLink="false">https://demo.searchstax.com/docs/?post_type=searchstudio&#038;p=19939</guid>

					<description><![CDATA[<p>SearchStax Site Search Single Sign-On (SSO) Setup for OneLogin The SearchStax Site Search solution now offers the ability for customers to set up OneLogin Single Sign-On (SSO) to let their&#8230; <a class="more-link" href="https://demo.searchstax.com/docs/searchstudio/single-sign-on-onelogin/">Continue reading <span class="screen-reader-text">Single Sign-On &#8211; OneLogin</span></a></p>
<p>The post <a href="https://demo.searchstax.com/docs/searchstudio/single-sign-on-onelogin/">Single Sign-On &#8211; OneLogin</a> appeared first on <a href="https://demo.searchstax.com/docs">SearchStax Docs</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<h1 class="wp-block-heading" id="h-searchstax-site-search-single-sign-on-sso-setup-for-onelogin">SearchStax Site Search Single Sign-On (SSO) Setup for OneLogin</h1>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<p>The SearchStax Site Search solution now offers the ability for customers to set up <strong>OneLogin</strong> <strong>Single Sign-On</strong> (SSO) to let their users log in with a single ID and password that works across multiple software systems.</p>



<p>We use the open standard Security Assertion Markup Language (SAML) to allow identity providers (IdP) to pass authorization credentials to service providers (SP). This page provides instruction to use <a href="https://app.onelogin.com/login">OneLogin</a> to implement SSO for SearchStax.</p>



<p>SSO is an add-on Site Search feature that is available with the <a href="https://www.searchstax.com/pricing/site-search/">Advanced and Premium plans</a>.</p>



<h2 class="wp-block-heading" id="h-instructions">Instructions</h2>



<p>Once SSO is enabled by SearchStax for your account, and a domain is set up, the options to set up SSO appear in the <strong>My Profile</strong> screen of the <strong>My Account</strong> menu:</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="880" height="560" src="https://demo.searchstax.com/docs/wp-content/uploads/2024/11/image-18.png" alt="" class="wp-image-20541" srcset="https://demo.searchstax.com/docs/wp-content/uploads/2024/11/image-18.png 880w, https://demo.searchstax.com/docs/wp-content/uploads/2024/11/image-18-300x191.png 300w, https://demo.searchstax.com/docs/wp-content/uploads/2024/11/image-18-768x489.png 768w" sizes="auto, (max-width: 880px) 100vw, 880px" /></figure>



<p>The <strong>Set Up Single Sign-On</strong> button leads to a screen of configuration URLs and feature options. You will need to refer to this screen while setting up the SSO profile with the Identity Provider. </p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="718" height="1024" src="https://demo.searchstax.com/docs/wp-content/uploads/2024/10/image-18-718x1024.png" alt="" class="wp-image-19953" srcset="https://demo.searchstax.com/docs/wp-content/uploads/2024/10/image-18-718x1024.png 718w, https://demo.searchstax.com/docs/wp-content/uploads/2024/10/image-18-210x300.png 210w, https://demo.searchstax.com/docs/wp-content/uploads/2024/10/image-18.png 763w" sizes="auto, (max-width: 718px) 100vw, 718px" /></figure>



<p>This screen contains the following fields and options:</p>



<ul class="wp-block-list">
<li><strong>Assertion Consumer Service (ACS) URL:</strong> Note that the URL includes your SSO domain (called <strong>mydomain</strong> in the following discussion).</li>



<li><strong>Metadata URL:</strong> SearchStax metadata endpoint.</li>



<li><strong>Enable Checkbox:</strong> If checked, SSO is enabled for this account. </li>



<li><strong>Assertion Responses Signed:</strong> Use the droplist to indicate whether assertions and/or responses should be signed. </li>



<li><strong>Allow Email Password Login Checkbox:</strong> If check, permits login by email/password in addition to SSO.</li>



<li><strong>Auto Create Users Checkbox:</strong> Should a new user account be created the first time a user logs in?</li>



<li><strong>IDP Entry URL:</strong> Identity provider URL.  </li>



<li><strong>Metadata URL:</strong> The SAML 2 Metadata URL.</li>



<li><strong>Sign-In URL:</strong> The URL used for signing into the SAMP Identity Provider. </li>



<li><strong>Sign-Out URL (Optional):</strong> The URL shown after a successful sign-out.</li>
</ul>



<h2 class="wp-block-heading" id="h-onelogin-setup">OneLogin Setup</h2>



<ol start="1" class="wp-block-list">
<li>Go to OneLogin administration dashboard and select the Applications drop down. Select <strong>Add App</strong> in the top right corner:<br> <img loading="lazy" decoding="async" width="200" height="126" class="wp-image-16395" style="width: 200px;" src="https://demo.searchstax.com/docs/wp-content/uploads/2023/09/Pasted.png" alt=""></li>



<li>Now Search for “SAML Custom Connector (Advanced)” and then select the application:<br><img loading="lazy" decoding="async" width="400" height="208" class="wp-image-16396" style="width: 400px;" src="https://demo.searchstax.com/docs/wp-content/uploads/2023/09/Pasted-1.png" alt="" srcset="https://demo.searchstax.com/docs/wp-content/uploads/2023/09/Pasted-1.png 399w, https://demo.searchstax.com/docs/wp-content/uploads/2023/09/Pasted-1-300x156.png 300w" sizes="auto, (max-width: 400px) 100vw, 400px" /></li>



<li>Enter a display name for the custom SearchStax application &#8211; something like &#8220;SearchStax”. Feel free to customize the icon as well then click <strong>Save</strong> in the top right corner:<br><img loading="lazy" decoding="async" width="600" height="390" class="wp-image-16397" style="width: 600px;" src="https://demo.searchstax.com/docs/wp-content/uploads/2023/09/Pasted-2.png" alt="" srcset="https://demo.searchstax.com/docs/wp-content/uploads/2023/09/Pasted-2.png 773w, https://demo.searchstax.com/docs/wp-content/uploads/2023/09/Pasted-2-300x195.png 300w, https://demo.searchstax.com/docs/wp-content/uploads/2023/09/Pasted-2-768x500.png 768w" sizes="auto, (max-width: 600px) 100vw, 600px" /></li>



<li>This creates a new Application in your user dashboard. Now go back to the applications tab still inside the administration dashboard and select your newly created application. You will see some new tabs on the left. Select the <strong>Configuration Tab</strong>:<br><img loading="lazy" decoding="async" width="400" height="196" class="wp-image-16398" style="width: 400px;" src="https://demo.searchstax.com/docs/wp-content/uploads/2023/09/Pasted-3.png" alt="" srcset="https://demo.searchstax.com/docs/wp-content/uploads/2023/09/Pasted-3.png 461w, https://demo.searchstax.com/docs/wp-content/uploads/2023/09/Pasted-3-300x147.png 300w" sizes="auto, (max-width: 400px) 100vw, 400px" /></li>



<li>This tab is where you will configure the SSO application with the information provided in our SearchStax dashboard. Since we used &#8220;mycompany&#8221; as our subdomain we will continue to use that here as well. Enter the provided metadata URL in the Audience (EntityID) box<br><br><img loading="lazy" decoding="async" width="700" height="149" class="wp-image-16400" style="width: 700px;" src="https://demo.searchstax.com/docs/wp-content/uploads/2023/09/Pasted-5.png" alt="" srcset="https://demo.searchstax.com/docs/wp-content/uploads/2023/09/Pasted-5.png 1107w, https://demo.searchstax.com/docs/wp-content/uploads/2023/09/Pasted-5-300x64.png 300w, https://demo.searchstax.com/docs/wp-content/uploads/2023/09/Pasted-5-1024x217.png 1024w, https://demo.searchstax.com/docs/wp-content/uploads/2023/09/Pasted-5-768x163.png 768w" sizes="auto, (max-width: 700px) 100vw, 700px" /></li>



<li>Enter the provided ACS URLs into the Recipient, ACS Validator, and ACS URL boxes:<br><img loading="lazy" decoding="async" width="500" height="363" class="wp-image-16401" style="width: 500px;" src="https://demo.searchstax.com/docs/wp-content/uploads/2023/09/Pasted-6.png" alt="" srcset="https://demo.searchstax.com/docs/wp-content/uploads/2023/09/Pasted-6.png 487w, https://demo.searchstax.com/docs/wp-content/uploads/2023/09/Pasted-6-300x218.png 300w" sizes="auto, (max-width: 500px) 100vw, 500px" /></li>



<li>Enter the Login URL into the Login URL Box:<br> <img loading="lazy" decoding="async" width="400" height="168" class="wp-image-16402" style="width: 400px;" src="https://demo.searchstax.com/docs/wp-content/uploads/2023/09/Pasted-7.png" alt="" srcset="https://demo.searchstax.com/docs/wp-content/uploads/2023/09/Pasted-7.png 357w, https://demo.searchstax.com/docs/wp-content/uploads/2023/09/Pasted-7-300x126.png 300w" sizes="auto, (max-width: 400px) 100vw, 400px" /></li>



<li>Be sure your settings align with what is shown below. This will be SP initiated, with a <strong>Persistent</strong> nameID, and both the assertion and response will be signed, then click <strong>Save</strong> in the top right: <br><img loading="lazy" decoding="async" width="500" height="445" class="wp-image-16403" style="width: 500px;" src="https://demo.searchstax.com/docs/wp-content/uploads/2023/09/Pasted-8.png" alt="" srcset="https://demo.searchstax.com/docs/wp-content/uploads/2023/09/Pasted-8.png 392w, https://demo.searchstax.com/docs/wp-content/uploads/2023/09/Pasted-8-300x267.png 300w" sizes="auto, (max-width: 500px) 100vw, 500px" /></li>



<li><mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-accent-color"></mark>Select the Parameters tab on the left. We expect <strong>Email, First Name</strong>, and <strong>Last Name</strong> to be passed so your parameters should look like the box below. You also have the ability to pass a &#8220;role&#8221; parameter. If you do not have a mapping for SearchStax roles, you can leave it as it, and the users will get created with <strong>Team Member</strong> as the role by default. These roles can always be changed later from the Managed Search Dashboard: <br><img loading="lazy" decoding="async" width="600" height="154" class="wp-image-16404" style="width: 600px;" src="https://demo.searchstax.com/docs/wp-content/uploads/2023/09/Pasted-9.png" alt="" srcset="https://demo.searchstax.com/docs/wp-content/uploads/2023/09/Pasted-9.png 996w, https://demo.searchstax.com/docs/wp-content/uploads/2023/09/Pasted-9-300x77.png 300w, https://demo.searchstax.com/docs/wp-content/uploads/2023/09/Pasted-9-768x197.png 768w" sizes="auto, (max-width: 600px) 100vw, 600px" /><br></li>



<li>Next click into the SSO tab on the left. Take note of the Issuer URL and the SAML 2.0 Endpoint. <br><img loading="lazy" decoding="async" width="600" height="150" class="wp-image-16406" style="width: 600px;" src="https://demo.searchstax.com/docs/wp-content/uploads/2023/09/Pasted-11.png" alt="" srcset="https://demo.searchstax.com/docs/wp-content/uploads/2023/09/Pasted-11.png 770w, https://demo.searchstax.com/docs/wp-content/uploads/2023/09/Pasted-11-300x75.png 300w, https://demo.searchstax.com/docs/wp-content/uploads/2023/09/Pasted-11-768x192.png 768w" sizes="auto, (max-width: 600px) 100vw, 600px" /><br>You will be putting these values in the Managed Search dashboard as shown below. Click <strong>Save Settings</strong> when finished:<br><br><img loading="lazy" decoding="async" width="700" height="348" class="wp-image-16405" style="width: 700px;" src="https://demo.searchstax.com/docs/wp-content/uploads/2023/09/Pasted-10.png" alt="" srcset="https://demo.searchstax.com/docs/wp-content/uploads/2023/09/Pasted-10.png 1281w, https://demo.searchstax.com/docs/wp-content/uploads/2023/09/Pasted-10-300x149.png 300w, https://demo.searchstax.com/docs/wp-content/uploads/2023/09/Pasted-10-1024x509.png 1024w, https://demo.searchstax.com/docs/wp-content/uploads/2023/09/Pasted-10-768x382.png 768w" sizes="auto, (max-width: 700px) 100vw, 700px" /></li>
</ol>



<p>The steps below show how we have integrated it with our OneLogin instance.</p>



<h2 class="wp-block-heading" id="h-login-using-sso">Login Using SSO</h2>



<p><a href="https://app.searchstax.com/login" target="_blank" rel="noreferrer noopener">The Site Search sign-in screen</a> provides a button at the bottom for SSO &#8211; “Sign-In With your ID Provider.” Click this button.</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="663" height="491" src="https://demo.searchstax.com/docs/wp-content/uploads/2024/10/image-14.png" alt="" class="wp-image-19945" srcset="https://demo.searchstax.com/docs/wp-content/uploads/2024/10/image-14.png 663w, https://demo.searchstax.com/docs/wp-content/uploads/2024/10/image-14-300x222.png 300w" sizes="auto, (max-width: 663px) 100vw, 663px" /></figure>



<p>Enter the domain that was set up for the client.</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="679" height="416" src="https://demo.searchstax.com/docs/wp-content/uploads/2024/10/image-15.png" alt="" class="wp-image-19946" srcset="https://demo.searchstax.com/docs/wp-content/uploads/2024/10/image-15.png 679w, https://demo.searchstax.com/docs/wp-content/uploads/2024/10/image-15-300x184.png 300w" sizes="auto, (max-width: 679px) 100vw, 679px" /></figure>



<p>Click <strong>Continue</strong>. This takes you to the OneLogin Sign-in page. After you authenticate, it brings you back to your Site Search Dashboard.</p>



<p>Alternately, you can directly go to <strong>https://&lt;Subdomain&gt;.searchstax.com</strong> to login, and clicking on the “Sign-In With your ID Provider” will take you directly to OneLogin.</p>



<h2 class="wp-block-heading" id="h-sso-two-factor-authentication"><strong>SSO + Two-factor Authentication</strong></h2>



<p>A User can have SSO and Two-Factor authentication both set up. The 2FA settings for a user will apply to all accounts that the user has access to.</p>



<p>However, for the account that has SSO Setup, SearchStax 2FA settings will not apply. In that case, 2FA should be set up at the SSO Provider.</p>



<div class="wp-block-group"><div class="wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained">
<h2 class="wp-block-heading" id="questions">Questions?</h2>



<p>Do not hesitate to contact the <a href="mailto:support@demo.searchstax.com?subject=Studio%3A%20Single%20Sign-On%20-%20OneLogin" target="_blank" rel="noreferrer noopener">SearchStax Support Desk</a>.</p>
</div></div>
<p>The post <a href="https://demo.searchstax.com/docs/searchstudio/single-sign-on-onelogin/">Single Sign-On &#8211; OneLogin</a> appeared first on <a href="https://demo.searchstax.com/docs">SearchStax Docs</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Single Sign-On &#8211; PingFederate</title>
		<link>https://demo.searchstax.com/docs/searchstudio/single-sign-on-pingfederate/</link>
		
		<dc:creator><![CDATA[Bruce]]></dc:creator>
		<pubDate>Fri, 01 Nov 2024 15:58:42 +0000</pubDate>
				<guid isPermaLink="false">https://demo.searchstax.com/docs/?post_type=searchstudio&#038;p=19957</guid>

					<description><![CDATA[<p>SearchStax Site Search Single Sign-On (SSO) Setup for PingFederate The SearchStax Site Search solution now offers the ability for customers to set up PingFederate Single Sign-On (SSO) to let their&#8230; <a class="more-link" href="https://demo.searchstax.com/docs/searchstudio/single-sign-on-pingfederate/">Continue reading <span class="screen-reader-text">Single Sign-On &#8211; PingFederate</span></a></p>
<p>The post <a href="https://demo.searchstax.com/docs/searchstudio/single-sign-on-pingfederate/">Single Sign-On &#8211; PingFederate</a> appeared first on <a href="https://demo.searchstax.com/docs">SearchStax Docs</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<h1 class="wp-block-heading" id="h-searchstax-site-search-single-sign-on-sso-setup-for-pingfederate">SearchStax Site Search Single Sign-On (SSO) Setup for PingFederate</h1>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<p>The SearchStax Site Search solution now offers the ability for customers to set up <strong>PingFederate</strong> <strong>Single Sign-On</strong> (SSO) to let their users log in with a single ID and password that works across multiple software systems.</p>



<p>We use the open standard Security Assertion Markup Language (SAML) to allow identity providers (IdP) to pass authorization credentials to service providers (SP). This page provides instruction to use <a href="https://www.pingidentity.com/en/platform/capabilities/authentication-authority/pingfederate.html">PingFederate</a> to implement SSO for SearchStax.</p>



<p>SSO is an add-on Site Search feature that is available with the <a href="https://www.searchstax.com/pricing/site-search/">Advanced and Premium plans</a>.</p>



<h2 class="wp-block-heading" id="h-instructions">Instructions</h2>



<p>Once SSO is enabled by SearchStax for your account, and a domain is set up, the options to set up SSO appear in the <strong>My Profile</strong> screen of the <strong>My Account</strong> menu:</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="880" height="560" src="https://demo.searchstax.com/docs/wp-content/uploads/2024/11/image-19.png" alt="" class="wp-image-20543" srcset="https://demo.searchstax.com/docs/wp-content/uploads/2024/11/image-19.png 880w, https://demo.searchstax.com/docs/wp-content/uploads/2024/11/image-19-300x191.png 300w, https://demo.searchstax.com/docs/wp-content/uploads/2024/11/image-19-768x489.png 768w" sizes="auto, (max-width: 880px) 100vw, 880px" /></figure>



<p>The <strong>Set Up Single Sign-On</strong> button leads to a screen of configuration URLs and feature options. You will need to refer to this screen while setting up the SSO profile with the Identity Provider. </p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="718" height="1024" src="https://demo.searchstax.com/docs/wp-content/uploads/2024/10/image-18-718x1024.png" alt="" class="wp-image-19953" srcset="https://demo.searchstax.com/docs/wp-content/uploads/2024/10/image-18-718x1024.png 718w, https://demo.searchstax.com/docs/wp-content/uploads/2024/10/image-18-210x300.png 210w, https://demo.searchstax.com/docs/wp-content/uploads/2024/10/image-18.png 763w" sizes="auto, (max-width: 718px) 100vw, 718px" /></figure>



<p>This screen contains the following fields and options:</p>



<ul class="wp-block-list">
<li><strong>Assertion Consumer Service (ACS) URL:</strong> Note that the URL includes your SSO domain (called <strong>mydomain</strong> in the following discussion).</li>



<li><strong>Metadata URL:</strong> SearchStax metadata endpoint.</li>



<li><strong>Enable Checkbox:</strong> If checked, SSO is enabled for this account. </li>



<li><strong>Assertion Responses Signed:</strong> Use the droplist to indicate whether assertions and/or responses should be signed. </li>



<li><strong>Allow Email Password Login Checkbox:</strong> If check, permits login by email/password in addition to SSO.</li>



<li><strong>Auto Create Users Checkbox:</strong> Should a new user account be created the first time a user logs in?</li>



<li><strong>IDP Entry URL:</strong> Identity provider URL.  </li>



<li><strong>Metadata URL:</strong> The SAML 2 Metadata URL.</li>



<li><strong>Sign-In URL:</strong> The URL used for signing into the SAMP Identity Provider. </li>



<li><strong>Sign-Out URL (Optional):</strong> The URL shown after a successful sign-out.</li>
</ul>



<h2 class="wp-block-heading" id="h-pingfederate-setup">PingFederate Setup</h2>



<p>Note: Make sure you have an Adapter already set up inside PingFederate!</p>



<p></p>



<ol start="1" class="wp-block-list">
<li>Go to PingFederate IdP administration console and select the  <strong>Create New </strong>button underneath the SP Connections section:<br> <img loading="lazy" decoding="async" width="300" height="158" class="wp-image-19900" style="width: 300px;" src="https://demo.searchstax.com/docs/wp-content/uploads/2024/10/Adapters-1.png" alt="" srcset="https://demo.searchstax.com/docs/wp-content/uploads/2024/10/Adapters-1.png 359w, https://demo.searchstax.com/docs/wp-content/uploads/2024/10/Adapters-1-300x158.png 300w" sizes="auto, (max-width: 300px) 100vw, 300px" /></li>



<li>In the Connection Type tab select the <strong>Browser SSO Profiles/SAML 2.0 Template</strong> then click Next. In the Connection Options continue with <strong>Browser SSO</strong> and hit Next again:<br><img loading="lazy" decoding="async" width="300" height="254" class="wp-image-19901" style="width: 300px;" src="https://demo.searchstax.com/docs/wp-content/uploads/2024/10/ConnectionType.png" alt="" srcset="https://demo.searchstax.com/docs/wp-content/uploads/2024/10/ConnectionType.png 369w, https://demo.searchstax.com/docs/wp-content/uploads/2024/10/ConnectionType-300x254.png 300w" sizes="auto, (max-width: 300px) 100vw, 300px" /><img loading="lazy" decoding="async" width="250" height="249" class="wp-image-19902" style="width: 250px;" src="https://demo.searchstax.com/docs/wp-content/uploads/2024/10/ConnectionOptions.png" alt="" srcset="https://demo.searchstax.com/docs/wp-content/uploads/2024/10/ConnectionOptions.png 267w, https://demo.searchstax.com/docs/wp-content/uploads/2024/10/ConnectionOptions-150x150.png 150w" sizes="auto, (max-width: 250px) 100vw, 250px" /></li>



<li>The next tab is the Import Metadata tab. You can choose to extract our metadata from the URL (shown in a screenshot above the instructions) in our dashboard and import it here, this will prefill some future sections for you:<img loading="lazy" decoding="async" width="350" height="169" class="wp-image-19904" style="width: 350px;" src="https://demo.searchstax.com/docs/wp-content/uploads/2024/10/ImportMetadata.png" alt="" srcset="https://demo.searchstax.com/docs/wp-content/uploads/2024/10/ImportMetadata.png 376w, https://demo.searchstax.com/docs/wp-content/uploads/2024/10/ImportMetadata-300x145.png 300w" sizes="auto, (max-width: 350px) 100vw, 350px" /><br></li>



<li>In the General Info tab you will need to ensure that the following boxes have the correct information in them whether you imported our metadata or not. <br><br>The Entity ID box should contain our EntityID which is also our metadata URL.<br> <br>Connection Name is whatever you want to use to identify this connection in your PingFed dashboard. <br><br>Virtual Server IDS is important because it will overwrite your &#8220;master&#8221; EntityID and display a value in your metadata that we require to connect properly. This will also need to be in a URL format so something like https://sso-t.com/idp/SSO.saml2 is recommended. <br><br>After this scroll to the bottom and click next<br><img loading="lazy" decoding="async" width="400" height="330" class="wp-image-19905" style="width: 400px;" src="https://demo.searchstax.com/docs/wp-content/uploads/2024/10/GeneralInfo.png" alt="" srcset="https://demo.searchstax.com/docs/wp-content/uploads/2024/10/GeneralInfo.png 460w, https://demo.searchstax.com/docs/wp-content/uploads/2024/10/GeneralInfo-300x248.png 300w" sizes="auto, (max-width: 400px) 100vw, 400px" /><br></li>



<li>The next tab is where you will configure the Browser SSO settings. After clicking configure Browser SSO select SP-Initiated SSO and hit Next. <br><img loading="lazy" decoding="async" width="300" height="211" class="wp-image-19907" style="width: 300px;" src="https://demo.searchstax.com/docs/wp-content/uploads/2024/10/SPInitiated.png" alt="" srcset="https://demo.searchstax.com/docs/wp-content/uploads/2024/10/SPInitiated.png 339w, https://demo.searchstax.com/docs/wp-content/uploads/2024/10/SPInitiated-300x211.png 300w" sizes="auto, (max-width: 300px) 100vw, 300px" /><br>We left the Assertion Lifetime settings as default and then hit next again. <br><img loading="lazy" decoding="async" width="300" height="233" class="wp-image-19908" style="width: 300px;" src="https://demo.searchstax.com/docs/wp-content/uploads/2024/10/AssertionLifetime.png" alt="" srcset="https://demo.searchstax.com/docs/wp-content/uploads/2024/10/AssertionLifetime.png 329w, https://demo.searchstax.com/docs/wp-content/uploads/2024/10/AssertionLifetime-300x233.png 300w" sizes="auto, (max-width: 300px) 100vw, 300px" /><br></li>



<li>Next we need to configure the Assertion Creation by clicking the Configure Assertion Creation button. Keep standard identity mapping and hit Next. In the Attribute Contract tab you will need to pass <strong>surname, email, and givenName</strong> in the assertion via the Extend the Contract sections and then hit Next. <br><img loading="lazy" decoding="async" width="500" height="243" class="wp-image-19910" style="width: 500px;" src="https://demo.searchstax.com/docs/wp-content/uploads/2024/10/Attributes.png" alt="" srcset="https://demo.searchstax.com/docs/wp-content/uploads/2024/10/Attributes.png 636w, https://demo.searchstax.com/docs/wp-content/uploads/2024/10/Attributes-300x146.png 300w" sizes="auto, (max-width: 500px) 100vw, 500px" /><br></li>



<li>Now that the attributes are created they need to be mapped. This is done with the Map New Adapter Instance button on the Authentication Source Mapping tab. <br><br>Here you will select the Adapter you have configured for this connection and then hit Next until you come to the Attribute Contract Fulfillment tab. <br><br>Here you will map your values to the email, surname, and givenName attributes being passed from your end, when finished hit Next and then the Done button until you see the Configure Protocol Settings button. <br> <img loading="lazy" decoding="async" width="550" height="176" class="wp-image-19911" style="width: 550px;" src="https://demo.searchstax.com/docs/wp-content/uploads/2024/10/Mapping.png" alt="" srcset="https://demo.searchstax.com/docs/wp-content/uploads/2024/10/Mapping.png 756w, https://demo.searchstax.com/docs/wp-content/uploads/2024/10/Mapping-300x96.png 300w" sizes="auto, (max-width: 550px) 100vw, 550px" /><br><br></li>



<li>When configuring the protocol you will want to send your POST requests to the ACS URL provided in our SearchStax dashboard. <br><img loading="lazy" decoding="async" width="450" height="214" class="wp-image-19916" style="width: 450px;" src="https://demo.searchstax.com/docs/wp-content/uploads/2024/10/ACS.png" alt="" srcset="https://demo.searchstax.com/docs/wp-content/uploads/2024/10/ACS.png 744w, https://demo.searchstax.com/docs/wp-content/uploads/2024/10/ACS-300x142.png 300w" sizes="auto, (max-width: 450px) 100vw, 450px" /><br>It will look something like this *.searchstax.com/saml2/acs/ then hit Next until you arrive at the Signature Policy Tab. <br><br>Here you will select the <strong>Always Sign the SAML Assertion </strong>box. Now hit Next again until you get to the Configure Credentials button.<br><img loading="lazy" decoding="async" width="450" height="197" class="wp-image-19918" style="width: 450px;" src="https://demo.searchstax.com/docs/wp-content/uploads/2024/10/SignedAssertions.png" alt="" srcset="https://demo.searchstax.com/docs/wp-content/uploads/2024/10/SignedAssertions.png 737w, https://demo.searchstax.com/docs/wp-content/uploads/2024/10/SignedAssertions-300x131.png 300w" sizes="auto, (max-width: 450px) 100vw, 450px" /><br><br></li>



<li>Here you are selecting the valid certificate used in your signings:<br><img loading="lazy" decoding="async" width="450" height="215" class="wp-image-19917" style="width: 450px;" src="https://demo.searchstax.com/docs/wp-content/uploads/2024/10/Certificate.png" alt="" srcset="https://demo.searchstax.com/docs/wp-content/uploads/2024/10/Certificate.png 738w, https://demo.searchstax.com/docs/wp-content/uploads/2024/10/Certificate-300x143.png 300w" sizes="auto, (max-width: 450px) 100vw, 450px" /><br><br>Now hit Next and review all the tabs that are presented. If everything looks good you can activate the connection and then hit <strong>Save</strong>. <br><br></li>



<li style="padding-top:0;padding-bottom:0">When you are finished settings things up in PingFed you will need to come back to our dashboard and input the values of your SSO:<br><img loading="lazy" decoding="async" width="500" height="251" class="wp-image-19921" style="width: 500px;" src="https://demo.searchstax.com/docs/wp-content/uploads/2024/10/PingFedInfo.png" alt="" srcset="https://demo.searchstax.com/docs/wp-content/uploads/2024/10/PingFedInfo.png 1278w, https://demo.searchstax.com/docs/wp-content/uploads/2024/10/PingFedInfo-300x151.png 300w, https://demo.searchstax.com/docs/wp-content/uploads/2024/10/PingFedInfo-1024x514.png 1024w, https://demo.searchstax.com/docs/wp-content/uploads/2024/10/PingFedInfo-768x386.png 768w" sizes="auto, (max-width: 500px) 100vw, 500px" /><br><br>We need your IdP Entity URL, as discussed above this will be your VSID that you configured specifically for this connection. <br>The URL to your metadata.<br>Then finally the Login URL used for this connection. <br>Once the above is added you can select the Enabled box and hit Save Settings. <br><br></li>
</ol>



<h2 class="wp-block-heading" id="h-login-using-sso">Login Using SSO</h2>



<p><a href="https://app.searchstax.com/login" target="_blank" rel="noreferrer noopener">The Site Search sign-in screen</a> provides a button at the bottom for SSO &#8211; “Sign-In With your ID Provider.” Click this button.</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="663" height="491" src="https://demo.searchstax.com/docs/wp-content/uploads/2024/10/image-14.png" alt="" class="wp-image-19945" srcset="https://demo.searchstax.com/docs/wp-content/uploads/2024/10/image-14.png 663w, https://demo.searchstax.com/docs/wp-content/uploads/2024/10/image-14-300x222.png 300w" sizes="auto, (max-width: 663px) 100vw, 663px" /></figure>



<p>Enter the domain that was set up for the client.</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="679" height="416" src="https://demo.searchstax.com/docs/wp-content/uploads/2024/10/image-15.png" alt="" class="wp-image-19946" srcset="https://demo.searchstax.com/docs/wp-content/uploads/2024/10/image-15.png 679w, https://demo.searchstax.com/docs/wp-content/uploads/2024/10/image-15-300x184.png 300w" sizes="auto, (max-width: 679px) 100vw, 679px" /></figure>



<p>Click <strong>Continue</strong>. This takes you to the PingFederate Sign-in page. After you authenticate, it brings you back to your Site Search Dashboard.</p>



<p>Alternately, you can directly go to <strong>https://&lt;Subdomain&gt;.searchstax.com</strong> to login, and clicking on the “Sign-In With your ID Provider” will take you directly to PingFederate.</p>



<h2 class="wp-block-heading" id="h-sso-two-factor-authentication"><strong>SSO + Two-factor Authentication</strong></h2>



<p>A User can have SSO and Two-Factor authentication both set up. The 2FA settings for a user will apply to all accounts that the user has access to.</p>



<p>However, for the account that has SSO Setup, SearchStax 2FA settings will not apply. In that case, 2FA should be set up at the SSO Provider.</p>



<div class="wp-block-group"><div class="wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained">
<h2 class="wp-block-heading" id="questions">Questions?</h2>



<p>Do not hesitate to contact the <a href="mailto:support@demo.searchstax.com?subject=Studio%3A%20Single%20Sign-On%20-%20PingFederate" target="_blank" rel="noreferrer noopener">SearchStax Support Desk</a>.</p>
</div></div>
<p>The post <a href="https://demo.searchstax.com/docs/searchstudio/single-sign-on-pingfederate/">Single Sign-On &#8211; PingFederate</a> appeared first on <a href="https://demo.searchstax.com/docs">SearchStax Docs</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Single Sign-On &#8211; Azure AD</title>
		<link>https://demo.searchstax.com/docs/searchstudio/single-sign-on-azure-ad-2/</link>
		
		<dc:creator><![CDATA[Bruce]]></dc:creator>
		<pubDate>Fri, 01 Nov 2024 15:59:26 +0000</pubDate>
				<guid isPermaLink="false">https://demo.searchstax.com/docs/?post_type=searchstudio&#038;p=19960</guid>

					<description><![CDATA[<p>SearchStax Site Search Single Sign-On (SSO) Setup for Azure AD The SearchStax Site Search solution now offers the ability for customers to set up Azure AD Single Sign-On (SSO) to&#8230; <a class="more-link" href="https://demo.searchstax.com/docs/searchstudio/single-sign-on-azure-ad-2/">Continue reading <span class="screen-reader-text">Single Sign-On &#8211; Azure AD</span></a></p>
<p>The post <a href="https://demo.searchstax.com/docs/searchstudio/single-sign-on-azure-ad-2/">Single Sign-On &#8211; Azure AD</a> appeared first on <a href="https://demo.searchstax.com/docs">SearchStax Docs</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<h1 class="wp-block-heading" id="h-searchstax-site-search-single-sign-on-sso-setup-for-azure-ad">SearchStax Site Search Single Sign-On (SSO) Setup for Azure AD</h1>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<p>The SearchStax Site Search solution now offers the ability for customers to set up <strong>Azure AD</strong> <strong>Single Sign-On</strong> (SSO) to let their users log in with a single ID and password that works across multiple software systems.</p>



<p>We use the open standard Security Assertion Markup Language (SAML) to allow identity providers (IdP) to pass authorization credentials to service providers (SP). This page provides instruction to use <a href="https://www.microsoft.com/en-us/security/business/identity-access/microsoft-entra-id">Azure AD</a> to implement SSO for SearchStax.</p>



<p>SSO is an add-on Site Search feature that is available with the <a href="https://www.searchstax.com/pricing/site-search/">Advanced and Premium plans</a>.</p>



<h2 class="wp-block-heading" id="h-instructions">Instructions</h2>



<p>Once SSO is enabled by SearchStax for your account, and a domain is set up, the options to set up SSO appear in the <strong>My Profile</strong> screen of the <strong>My Account</strong> menu:</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="880" height="560" src="https://demo.searchstax.com/docs/wp-content/uploads/2024/11/image-20.png" alt="" class="wp-image-20545" srcset="https://demo.searchstax.com/docs/wp-content/uploads/2024/11/image-20.png 880w, https://demo.searchstax.com/docs/wp-content/uploads/2024/11/image-20-300x191.png 300w, https://demo.searchstax.com/docs/wp-content/uploads/2024/11/image-20-768x489.png 768w" sizes="auto, (max-width: 880px) 100vw, 880px" /></figure>



<p>The <strong>Set Up Single Sign-On</strong> button leads to a screen of configuration URLs and feature options. You will need to refer to this screen while setting up the SSO profile with the Identity Provider. </p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="718" height="1024" src="https://demo.searchstax.com/docs/wp-content/uploads/2024/10/image-18-718x1024.png" alt="" class="wp-image-19953" srcset="https://demo.searchstax.com/docs/wp-content/uploads/2024/10/image-18-718x1024.png 718w, https://demo.searchstax.com/docs/wp-content/uploads/2024/10/image-18-210x300.png 210w, https://demo.searchstax.com/docs/wp-content/uploads/2024/10/image-18.png 763w" sizes="auto, (max-width: 718px) 100vw, 718px" /></figure>



<p>This screen contains the following fields and options:</p>



<ul class="wp-block-list">
<li><strong>Assertion Consumer Service (ACS) URL:</strong> Note that the URL includes your SSO domain (called <strong>mydomain</strong> in the following discussion).</li>



<li><strong>Metadata URL:</strong> SearchStax metadata endpoint.</li>



<li><strong>Enable Checkbox:</strong> If checked, SSO is enabled for this account. </li>



<li><strong>Assertion Responses Signed:</strong> Use the droplist to indicate whether assertions and/or responses should be signed. </li>



<li><strong>Allow Email Password Login Checkbox:</strong> If check, permits login by email/password in addition to SSO.</li>



<li><strong>Auto Create Users Checkbox:</strong> Should a new user account be created the first time a user logs in?</li>



<li><strong>IDP Entry URL:</strong> Identity provider URL.  </li>



<li><strong>Metadata URL:</strong> The SAML 2 Metadata URL.</li>



<li><strong>Sign-In URL:</strong> The URL used for signing into the SAMP Identity Provider. </li>



<li><strong>Sign-Out URL (Optional):</strong> The URL shown after a successful sign-out.</li>
</ul>



<h2 class="wp-block-heading" id="h-azure-ad-setup">Azure AD Setup</h2>



<p></p>



<ol start="1" class="wp-block-list">
<li>Go to Azure Active Directory. Select Enterprise Applications, and then click on “New Application.” <img loading="lazy" decoding="async" width="500" height="332" class="wp-image-8908" style="width: 500px;" src="https://demo.searchstax.com/docs/wp-content/uploads/2021/05/image-34.png" alt="Searchstax Single Sign-On" srcset="https://demo.searchstax.com/docs/wp-content/uploads/2021/05/image-34.png 724w, https://demo.searchstax.com/docs/wp-content/uploads/2021/05/image-34-300x199.png 300w" sizes="auto, (max-width: 500px) 100vw, 500px" /></li>



<li>Now Click on “Create your own application.”<img loading="lazy" decoding="async" width="500" height="373" class="wp-image-8909" style="width: 500px;" src="https://demo.searchstax.com/docs/wp-content/uploads/2021/05/image-35.png" alt="Searchstax Single Sign-On" srcset="https://demo.searchstax.com/docs/wp-content/uploads/2021/05/image-35.png 729w, https://demo.searchstax.com/docs/wp-content/uploads/2021/05/image-35-300x224.png 300w" sizes="auto, (max-width: 500px) 100vw, 500px" /></li>



<li>Enter a name for SearchStax application &#8211; say “SearchStaxManagedSolr”, and select the last dropdown “Integrate any application you don’t find in the gallery” and then click on the “Create” button. <img loading="lazy" decoding="async" width="500" height="246" class="wp-image-8910" style="width: 500px;" src="https://demo.searchstax.com/docs/wp-content/uploads/2021/05/image-36.png" alt="Searchstax Single Sign-On" srcset="https://demo.searchstax.com/docs/wp-content/uploads/2021/05/image-36.png 795w, https://demo.searchstax.com/docs/wp-content/uploads/2021/05/image-36-300x148.png 300w, https://demo.searchstax.com/docs/wp-content/uploads/2021/05/image-36-768x378.png 768w" sizes="auto, (max-width: 500px) 100vw, 500px" /></li>



<li>This creates a new Enterprise Application. In the screen that appears, click on the link for <strong>Step 1 &gt; Assign Users and Groups</strong>. Here you can assign which Users/Groups have permission to SearchStaxManagedSolr Enterprise Application. <img loading="lazy" decoding="async" width="800" height="473" class="wp-image-8911" style="width: 800px;" src="https://demo.searchstax.com/docs/wp-content/uploads/2021/05/image-37.png" alt="Searchstax Single Sign-On" srcset="https://demo.searchstax.com/docs/wp-content/uploads/2021/05/image-37.png 1107w, https://demo.searchstax.com/docs/wp-content/uploads/2021/05/image-37-300x177.png 300w, https://demo.searchstax.com/docs/wp-content/uploads/2021/05/image-37-1024x605.png 1024w, https://demo.searchstax.com/docs/wp-content/uploads/2021/05/image-37-768x454.png 768w" sizes="auto, (max-width: 800px) 100vw, 800px" /></li>



<li>Click on “Add user/group” and then follow up to add all the users of groups that you would like to grant access to. <img loading="lazy" decoding="async" width="600" height="355" class="wp-image-8912" style="width: 600px;" src="https://demo.searchstax.com/docs/wp-content/uploads/2021/05/image-38.png" alt="Searchstax Single Sign-On" srcset="https://demo.searchstax.com/docs/wp-content/uploads/2021/05/image-38.png 1112w, https://demo.searchstax.com/docs/wp-content/uploads/2021/05/image-38-300x178.png 300w, https://demo.searchstax.com/docs/wp-content/uploads/2021/05/image-38-1024x606.png 1024w, https://demo.searchstax.com/docs/wp-content/uploads/2021/05/image-38-768x454.png 768w" sizes="auto, (max-width: 600px) 100vw, 600px" /></li>



<li>Once you are done with Step 1, click on the “Get started” link for <strong>Step 2. Setup single sign on</strong>. <img loading="lazy" decoding="async" width="800" height="461" class="wp-image-8913" style="width: 800px;" src="https://demo.searchstax.com/docs/wp-content/uploads/2021/05/image-39.png" alt="Searchstax Single Sign-On" srcset="https://demo.searchstax.com/docs/wp-content/uploads/2021/05/image-39.png 1156w, https://demo.searchstax.com/docs/wp-content/uploads/2021/05/image-39-300x173.png 300w, https://demo.searchstax.com/docs/wp-content/uploads/2021/05/image-39-1024x590.png 1024w, https://demo.searchstax.com/docs/wp-content/uploads/2021/05/image-39-768x442.png 768w" sizes="auto, (max-width: 800px) 100vw, 800px" /></li>



<li>Now select the single sign-on method as “<strong>SAML</strong>.” <img loading="lazy" decoding="async" width="800" height="198" class="wp-image-8914" style="width: 800px;" src="https://demo.searchstax.com/docs/wp-content/uploads/2021/05/image-40.png" alt="Searchstax Single Sign-On" srcset="https://demo.searchstax.com/docs/wp-content/uploads/2021/05/image-40.png 1227w, https://demo.searchstax.com/docs/wp-content/uploads/2021/05/image-40-300x74.png 300w, https://demo.searchstax.com/docs/wp-content/uploads/2021/05/image-40-1024x253.png 1024w, https://demo.searchstax.com/docs/wp-content/uploads/2021/05/image-40-768x190.png 768w, https://demo.searchstax.com/docs/wp-content/uploads/2021/05/image-40-1200x296.png 1200w" sizes="auto, (max-width: 800px) 100vw, 800px" /></li>



<li>It now shows the screen to configure the SAML endpoints: <img loading="lazy" decoding="async" width="800" height="838" class="wp-image-8935" style="width: 800px;" src="https://demo.searchstax.com/docs/wp-content/uploads/2021/05/Pasted-3.png" alt="Searchstax Single Sign-On" srcset="https://demo.searchstax.com/docs/wp-content/uploads/2021/05/Pasted-3.png 978w, https://demo.searchstax.com/docs/wp-content/uploads/2021/05/Pasted-3-286x300.png 286w, https://demo.searchstax.com/docs/wp-content/uploads/2021/05/Pasted-3-768x805.png 768w" sizes="auto, (max-width: 800px) 100vw, 800px" /></li>



<li><mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-accent-color"></mark>Click on Edit on Step 3, and change Signing Option as “Sign SAML assertion” and click “Save.” <img loading="lazy" decoding="async" width="600" height="287" class="wp-image-8916" style="width: 600px;" src="https://demo.searchstax.com/docs/wp-content/uploads/2021/05/image-42.png" alt="Searchstax Single Sign-On" srcset="https://demo.searchstax.com/docs/wp-content/uploads/2021/05/image-42.png 1170w, https://demo.searchstax.com/docs/wp-content/uploads/2021/05/image-42-300x143.png 300w, https://demo.searchstax.com/docs/wp-content/uploads/2021/05/image-42-1024x489.png 1024w, https://demo.searchstax.com/docs/wp-content/uploads/2021/05/image-42-768x367.png 768w" sizes="auto, (max-width: 600px) 100vw, 600px" />The option can be anything else too, but the same setting should then also be chosen in the Managed Search Dashboard in the SSO settings.</li>



<li>Click on Edit button for Step 1 &gt; Basic SAML Configuration.
<ol style="list-style-type:lower-alpha" class="wp-block-list">
<li>Enter the “Metadata URL” that shows on your <a href="https://app.searchstax.com/login?next=/admin/deployment/" target="_blank" rel="noreferrer noopener">https://app.searchstax.com/admin/sso/configure/saml2/</a> page as Identifier (Entity ID). Remove any extra entries and make sure the “default” checkbox is checked.</li>



<li>Enter the Assertion Consumer Service URL as the “Reply URL” as shown below.</li>



<li>Click “Save.” <img loading="lazy" decoding="async" width="800" height="769" class="wp-image-8917" style="width: 800px;" src="https://demo.searchstax.com/docs/wp-content/uploads/2021/05/image-43.png" alt="Searchstax Single Sign-On" srcset="https://demo.searchstax.com/docs/wp-content/uploads/2021/05/image-43.png 782w, https://demo.searchstax.com/docs/wp-content/uploads/2021/05/image-43-300x288.png 300w, https://demo.searchstax.com/docs/wp-content/uploads/2021/05/image-43-768x739.png 768w" sizes="auto, (max-width: 800px) 100vw, 800px" /></li>
</ol>
</li>



<li>Set up Step 2 &gt; User Attributes &amp; Claims. Click on <strong>Edit</strong>. <img loading="lazy" decoding="async" width="600" height="155" class="wp-image-8919" style="width: 600px;" src="https://demo.searchstax.com/docs/wp-content/uploads/2021/05/image-45.png" alt="Searchstax Single Sign-On" srcset="https://demo.searchstax.com/docs/wp-content/uploads/2021/05/image-45.png 1175w, https://demo.searchstax.com/docs/wp-content/uploads/2021/05/image-45-300x78.png 300w, https://demo.searchstax.com/docs/wp-content/uploads/2021/05/image-45-1024x265.png 1024w, https://demo.searchstax.com/docs/wp-content/uploads/2021/05/image-45-768x199.png 768w" sizes="auto, (max-width: 600px) 100vw, 600px" /></li>



<li>Managed Search has roles defined. If your active directory has a field containing a mapping for those roles, click on “Add new claim” and assign “role”. If you do not have a mapping for Managed Search roles, you can leave it as it, and the users will get created with Team Member as the role by default. Those can always be changed later from the Managed Search Dashboard.<br><br>As just an example, we are mapping user.jobtitle field as the “role” as shown below.<br><br>The Unique User Identifier (Name ID) should be mapped to your active directory field that is the email for the users that will use Managed Search. In our case, the default user.userprincipalname contained the information.<img loading="lazy" decoding="async" width="600" height="371" class="wp-image-8920" style="width: 600px;" src="https://demo.searchstax.com/docs/wp-content/uploads/2021/05/Pasted.png" alt="Searchstax Single Sign-On" srcset="https://demo.searchstax.com/docs/wp-content/uploads/2021/05/Pasted.png 1150w, https://demo.searchstax.com/docs/wp-content/uploads/2021/05/Pasted-300x185.png 300w, https://demo.searchstax.com/docs/wp-content/uploads/2021/05/Pasted-1024x633.png 1024w, https://demo.searchstax.com/docs/wp-content/uploads/2021/05/Pasted-768x475.png 768w" sizes="auto, (max-width: 600px) 100vw, 600px" /></li>



<li>Now back on the Managed Search dashboard&#8230;
<ol style="list-style-type:lower-alpha" class="wp-block-list">
<li>Set the “Metadata url” as the “App Federation Metadata Url” shown in Step 3. </li>



<li><mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-accent-color"></mark>Set the “Login Url” as the “Login URL” shown in Step 4.</li>



<li>Set the “Logout Url” as the “Logout URL” shown in Step 4.</li>



<li>Set the “Idp Entity Url” as the “Azure AD Identifier” shown in Step 4. </li>
</ol>
</li>
</ol>



<figure class="wp-block-image size-full"><img decoding="async" src="https://demo.searchstax.com/docs/wp-content/uploads/2023/03/image-30-1024x698.png" alt="" class="wp-image-10548"/></figure>



<h2 class="wp-block-heading" id="h-login-using-sso">Login Using SSO</h2>



<p><a href="https://app.searchstax.com/login" target="_blank" rel="noreferrer noopener">The Site Search sign-in screen</a> provides a button at the bottom for SSO &#8211; “Sign-In With your ID Provider.” Click this button.</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="663" height="491" src="https://demo.searchstax.com/docs/wp-content/uploads/2024/10/image-14.png" alt="" class="wp-image-19945" srcset="https://demo.searchstax.com/docs/wp-content/uploads/2024/10/image-14.png 663w, https://demo.searchstax.com/docs/wp-content/uploads/2024/10/image-14-300x222.png 300w" sizes="auto, (max-width: 663px) 100vw, 663px" /></figure>



<p>Enter the domain that was set up for the client.</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="679" height="416" src="https://demo.searchstax.com/docs/wp-content/uploads/2024/10/image-15.png" alt="" class="wp-image-19946" srcset="https://demo.searchstax.com/docs/wp-content/uploads/2024/10/image-15.png 679w, https://demo.searchstax.com/docs/wp-content/uploads/2024/10/image-15-300x184.png 300w" sizes="auto, (max-width: 679px) 100vw, 679px" /></figure>



<p>Click <strong>Continue</strong>. This takes you to the Azure AD Sign-in page. After you authenticate, it brings you back to your Site Search Dashboard.</p>



<p>Alternately, you can directly go to <strong>https://&lt;Subdomain&gt;.searchstax.com</strong> to login, and clicking on the “Sign-In With your ID Provider” will take you directly to Azure AD.</p>



<h2 class="wp-block-heading" id="h-sso-two-factor-authentication"><strong>SSO + Two-factor Authentication</strong></h2>



<p>A User can have SSO and Two-Factor authentication both set up. The 2FA settings for a user will apply to all accounts that the user has access to.</p>



<p>However, for the account that has SSO Setup, SearchStax 2FA settings will not apply. In that case, 2FA should be set up at the SSO Provider.</p>



<div class="wp-block-group"><div class="wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained">
<h2 class="wp-block-heading" id="questions">Questions?</h2>



<p>Do not hesitate to contact the <a href="mailto:support@demo.searchstax.com?subject=Studio%3A%20Single%20Sign-On%20-%20Azure%20AD" target="_blank" rel="noreferrer noopener">SearchStax Support Desk</a>.</p>
</div></div>
<p>The post <a href="https://demo.searchstax.com/docs/searchstudio/single-sign-on-azure-ad-2/">Single Sign-On &#8211; Azure AD</a> appeared first on <a href="https://demo.searchstax.com/docs">SearchStax Docs</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
