Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Overview

In addition to Microsoft Entra ID, Okta, Google, or and Onelogin. , Zilla supports support SAML Single Sign-On on with any IDP, as long as we can obtain key pieces of Identity Provider (IDP). If Zilla can obtain the required information from that IDP , and ensure that certain values are passed in the SAML assertion. Once this integration is complete, all users of Zilla will be able to sign in from your IDP.

Table of Contents

Prerequisites

...

, organization can configure the IDP for SSO and use to log in to your Zilla Security tenant.

Scope: Admins

This article covers the following topics:

Prerequisites

  • Admin account with Zilla Security

  • Zilla SSO should has not have been configured or SSO configuration must be has been deleted using in admin settings

  • You must be logged into your IDP admin account

...

Zilla SAML Provider Setup

  1. Log in as a Zilla admin

...

  1. and click on the Settings tab on the left side of the page. On the Discovery & Configuration tab, expand the Single Sign-On Provider dropdown and click Configure.

...

  1. Select SAML and then click Configure.

...

A Configure SAML window will appear.

...

  1. Copy the

...

  1. Zilla ACS

...

  1. URL and

...

  1. Zilla Entity

...

  1. ID to your clipboard.

...

IDP App Setup

  1. In the app connector you have created in your IDP, paste the

...

  1. Zilla ACS

...

  1. URL and

...

  1. Zilla Entity

...

  1. ID (sometimes called the SP Entity ID) into their respective fields.

  2. If your IDP requires an

...

  1. Audience, use the Zilla Entity ID value.

  2. For the

...

  1. ACS URL

...

  1. Validator field, use the following value: ^https:\/\/app\.zillasecurity\.com\/$ and save your configuration.

Info

It is important to For security reasons, please ensure you use the exact value above for security reasons. Using .* as an ACS Validator is not suited for production use in any application.

4. Next, look Look for the following values in the IDP app connector and paste them into the corresponding field in Zilla;

...

:

  • SSO URL (sometimes called the “SAML endpoint”, or “Sign SAML endpoint or Sign-in URL”“Entity ID”, URL)

  • Entity ID (sometimes called “Issuer” Issuer)

5. In your app Connector, we will need to add 3 custom attributes, as Zilla expects these the exact values listed below in a SAML assertion. The attributes areAdd 3 custom attributes to your app connector for:

  • email

  • firstName

  • lastName

6. In your IDP, find the “x.509” certificate that you wish x.509 Certificate you plan to use for this integration . Copy and copy its contents to your clipboard and paste it . Paste the value into the Zilla “IDP IDP X.509 Certificate” Certificate field.

Info

Important: When pasting this certificate into the Zilla

...

IDP X.509

...

Certificate field,

...

remember to remove

...

-----BEGIN CERTIFICATE-----

...

and

...

-----END CERTIFICATE-----

...

from the pasted value.

...

  1. Click Validate in the Zilla SSO Configuration window. The test should be successful if the admin testing the configuration has been assigned to the Zilla connector in your IDP correctly.

Once you have imported users from your directory into Zilla, both Admins and Reviewers should now be able to use Single Sign-On to access ZillaAny reviewers, technical owners, or app owners can now log in to Zilla to see the apps and reviews they have been assigned using SSO.

When you have completed the steps above, review the information that was synced in Zilla. If you encounter any issues, please refer to our troubleshooting articles or visit support.zillasecurity.com and submit a ticket. Our support team will assist you in resolving the problem as quickly as possible.