Overview
UTMStack supports SAML 2.0 single sign-on (SSO) integration using Spring Security SAML2 Service Provider. SAML SSO enables centralized authentication through your enterprise identity provider (IdP), providing:- Centralized user management
- Single sign-on across applications
- Automated user provisioning
- Role mapping from IdP attributes
- Enhanced security through IdP policies
Supported Identity Providers
UTMStack’s SAML implementation works with any SAML 2.0 compliant identity provider:- Okta
- Azure Active Directory (Microsoft Entra ID)
- Google Workspace
- OneLogin
- PingFederate
- ADFS (Active Directory Federation Services)
- Auth0
- Custom SAML 2.0 providers
SAML Architecture
UTMStack acts as a SAML Service Provider (SP):- Service Provider (SP): UTMStack
- Identity Provider (IdP): Your enterprise SSO provider
- SAML Metadata: XML configuration exchanged between SP and IdP
- Assertions: Signed statements about user identity and attributes
Initial SAML Setup
Step 1: Gather UTMStack Metadata
Step 2: Configure Identity Provider
Configuration varies by IdP. General steps:Configure Attribute Mapping
Map IdP attributes to SAML assertions:
- Email (required):
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress - First Name:
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/givenname - Last Name:
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/surname - Groups/Roles:
http://schemas.xmlsoap.org/claims/Group
Step 3: Configure UTMStack
Upload IdP Metadata
In Settings > Authentication > SAML SSO, click Upload IdP Metadata and select the XML file from your IdP.
Configure Attribute Mapping
Map SAML attributes to UTMStack user properties:
- Email: SAML attribute name for email (e.g.,
emailorhttp://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress) - First Name: Attribute for first name
- Last Name: Attribute for last name
- Groups: Attribute containing group/role information
Configure Role Mapping
Map IdP groups to UTMStack roles (see Role Mapping below).
Role Mapping
Map IdP groups to UTMStack roles for automatic permission assignment:Add Mapping Rule
Click Add Role Mapping and configure:
- IdP Group: The group name from your identity provider (e.g.,
UTMStack-Admins) - UTMStack Role: The corresponding UTMStack role (e.g.,
Administrator) - Priority: Order of evaluation (higher priority first)
Configure Default Role
Set a default role for users not matching any mapping rules (recommended:
Viewer).| IdP Group | UTMStack Role | Description |
|---|---|---|
| UTMStack-Admins | Administrator | Full system access |
| UTMStack-Analysts | Security Analyst | Operational monitoring |
| UTMStack-Auditors | Auditor | Read-only compliance access |
| UTMStack-Viewers | Viewer | Limited dashboard access |
User Provisioning
Just-In-Time (JIT) Provisioning
UTMStack supports automatic user creation on first SAML login:Enable JIT Provisioning
Navigate to Settings > Authentication > SAML SSO and enable Just-In-Time Provisioning.
- User authenticates via SAML for the first time
- UTMStack receives SAML assertion
- System checks if user exists (by email)
- If new: User account is created automatically
- Roles are assigned based on mapping rules
- User is logged into UTMStack
Manual User Provisioning
Disable JIT provisioning to require manual user creation:- Administrators create users in advance
- SAML authentication links to existing accounts by email
- Provides tighter control over user access
- Useful for highly regulated environments
SAML Authentication Flow
SP-Initiated Login
User starts at UTMStack login page:Assertion Validation
UTMStack validates:
- SAML signature
- Assertion expiration
- Audience restriction
- Issuer validation
IdP-Initiated Login
User starts from IdP portal:- User logs into IdP portal (e.g., Okta dashboard)
- User clicks UTMStack application tile
- IdP sends SAML assertion to UTMStack
- UTMStack validates and creates session
- User is logged into UTMStack
Advanced SAML Configuration
Signature and Encryption
Configure SAML security settings:Signature Requirements
Enable:
- Require Signed Assertions: IdP must sign SAML assertions
- Require Signed Responses: IdP must sign entire SAML response
- Sign Authentication Requests: UTMStack signs outgoing requests
Certificate Management
Manage SAML signing and encryption certificates:Single Logout (SLO)
Configure SAML Single Logout for improved security:
When enabled:
- Logging out of UTMStack triggers IdP logout
- Logging out of IdP can trigger UTMStack logout
- Prevents session hijacking via IdP session reuse
Provider-Specific Guides
Okta Configuration
In Okta:- Create new SAML 2.0 app integration
- Set Single sign-on URL:
https://your-utmstack.com/login/saml2/sso - Set Audience URI:
https://your-utmstack.com/saml2/service-provider-metadata - Attribute Statements:
email→user.emailfirstName→user.firstNamelastName→user.lastName
- Group Attribute Statements:
groups→ Matches regex.*
- Upload Okta metadata XML
- Map
groupsattribute to UTMStack roles - Enable JIT provisioning
Azure AD Configuration
In Azure AD:- Create new Enterprise Application
- Select SAML authentication
- Set Identifier (Entity ID):
https://your-utmstack.com/saml2/service-provider-metadata - Set Reply URL:
https://your-utmstack.com/login/saml2/sso - Attributes & Claims:
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress→user.mailhttp://schemas.xmlsoap.org/ws/2005/05/identity/claims/givenname→user.givennamehttp://schemas.xmlsoap.org/ws/2005/05/identity/claims/surname→user.surnamehttp://schemas.xmlsoap.org/claims/Group→user.groups
- Upload Azure AD metadata XML (Federation Metadata XML)
- Map claims to user attributes
- Configure group-to-role mappings
Monitoring and Troubleshooting
SAML Authentication Logs
All SAML events are logged:- SAML login attempts (success/failure)
- Assertion validation errors
- Role mapping results
- User provisioning events
Testing SAML Configuration
Use the built-in SAML tester:Common SAML Issues
“SAML Response Signature Invalid”- IdP certificate mismatch
- Clock skew between UTMStack and IdP
- IdP metadata out of date
- Re-download and upload IdP metadata
- Verify server time synchronization (NTP)
- Check certificate expiration
- Email attribute not mapped correctly
- JIT provisioning disabled
- Email mismatch between IdP and UTMStack
- Verify email attribute mapping
- Enable JIT provisioning or manually create user
- Check SAML assertion for correct email value
- User’s IdP group not mapped to UTMStack role
- No default role configured
- Group attribute not included in assertion
- Review role mapping rules
- Set a default role
- Verify IdP sends group attribute in assertion
Security Best Practices
Backup Authentication
Maintain alternative authentication methods:Disabling SAML in Emergency
If SAML authentication fails system-wide:- Access server via SSH/console
- Run emergency SAML disable command:
- Log in with local administrator account
- Diagnose and fix SAML configuration
- Re-enable SAML after validation
Compliance and Auditing
SAML SSO supports compliance requirements:- Centralized Authentication: Single point of authentication control
- Audit Trail: Complete logging of authentication events
- Role-Based Access: Automatic permission assignment via IdP groups
- MFA Integration: Leverage IdP multi-factor authentication
- Automated Provisioning: JIT provisioning with audit trail
Related Topics
- Authentication Configuration - Configure authentication methods
- User Management - Manage user accounts
- Roles and Permissions - Configure RBAC and role mapping
- Two-Factor Authentication - Additional authentication security