Note: If your identity provider requires you to input metadata instead of providing a URL, open the Service Provider Metadata URL in your browser and copy the properties from the XML file. Add the Single Sign-On URL or Service Provider Metadata to your identity provider.Portal level: Configure access to portals with SAML on an individual basis.Account level: Configure access to all existing portals and any new portals with the same SAML authentication settings.SHA-256: Encrypt communication with the SAML service provider using SHA-256.SHA-1: Encrypt communication with the SAML service provider using SHA-1.Under Authentication type, select SAML 2.0.Under Authentication, select Login is required.In the IT Administration Console, click Security.HTTP-Redirect services are not supported. Note: The identity provider metadata must include an HTTP-Post login service location.
The metadata can be updated by referencing the file again and selecting Save Changes. Its information is stored within Media Shuttle. Identity Provider Metadata: This file tells Media Shuttle where to send the user to be authenticated. For configuration details, see Service Provider Metadata. Others require you to input service provider metadata manually. Note: Some identity providers accept a Service Provider Metadata URL. The service provider metadata file also provides the location to which users are returned after authenticating through the identity provider. Service Provider Metadata: This file allows the identity provider to know the request is originating from an authorized service provider. In establishing the trust between the service provider and the identity provider, there are two metadata configuration files: In Media Shuttle you must configure your Encryption Method, Configuration Type, Service Provider Metadata, Domain Restrictions and Identity Provider Metadata. To use an external identity provider with Media Shuttle, both Media Shuttle and your identity provider require configuration so that they communicate using SAML. Media Shuttle supports authentication using SAML 2.0 compatible identity providers to allow portal members to use Single Sign-On (SSO).