Table of Contents

Search

  1. Preface
  2. User administration
  3. Ecosystem single sign-on
  4. SAML single sign-on
  5. Users
  6. User groups
  7. User roles
  8. User configuration examples
  9. Editing your user profile

User Administration

User Administration

SSO configuration properties

SSO configuration properties

Define single sign-on configuration properties on the
SAML Setup
page.
If you have an identity provider XML file, you can upload the file to populate some of the properties.
Informatica Intelligent Cloud Services
can parse and extract most of the data from the XML file. However, you might need to enter certain fields manually such as the name identifier format.
The following table describes the SSO configuration properties:
Property
Description
Use Identity Provider File
The identity provider XML file that populates many of the properties on the
SAML Setup
page.
To use an identity provider XML file to define identity provider properties, click
Browse
, and navigate to the identity provider XML file.
Disable auto provisioning of users
Disables auto-provisioning of SAML users.
When you enable this option, users are not automatically added to the organization when they attempt to sign on to
Informatica Intelligent Cloud Services
for the first time.
If you disable auto-provisioning and you don't use SCIM 2.0 to push user and group information from the identity provider, you must create the users manually in
Administrator
.
If you use SCIM 2.0, this option is disabled because users are provisioned by the SCIM client.
Default is disabled.
Map SAML Groups and Roles
Maps groups and roles from the SAML token each time a user signs on to
Informatica Intelligent Cloud Services
.
Enable this option to use SAML SSO for both authentication and authorization. Disable this option to use SAML SSO for authentication only.
Default is disabled.
Enable IdP to push users/groups using SCIM 2.0
Allows your identity provider to push user and group information to
Informatica Intelligent Cloud Services
using SCIM 2.0 in addition to passing these attributes in the SAML token.
When you enable this option, you must generate a bearer token for the identity provider (SCIM client). To generate the token, click
Generate Token
.
If you provide the identity provider with a token and then generate a new token, the previous token is overwritten, and you must provide the identity provider with the new token.
When you enable this option, auto-provisioning of users is disabled because users are provisioned through the SCIM client.
Default is disabled.

0 COMMENTS

We’d like to hear from you!