I am a Zivver admin
Configure and manage Zivver
SSO with HelloID
Introduction
Zivver supports Single Sign-On (SSO) via HelloID from Tools4Ever, allowing users to log in to Zivver with their workplace credentials. This manual describes how to set up SSO as a Zivver administrator.
SSO operates on the basis of Security Assertion Markup Language (SAML) v2.0. In this scenario, HelloID acts as the Identity Provider (IdP) and Zivver as the Service Provider (SP).
To configure HelloID as an IdP for Zivver, you need:
- Zivver administrator rights.
- Access to the HelloID admin portal.
Configure SSO in HelloID
Generate or import a certificate
A certificate is required for the SSO connection. If your organization does not yet have a certificate, follow these steps to import or generate one in HelloID. In this example, a self-signed certificate is generated:
- Go to the HelloID Administrator Portal.
- Select Settings.
- Go to Certificates.
- Import or generate a certificate in HelloID:
You now have a certificate. HelloID can securely communicate with Zivver.
Install and configure the Zivver HelloID application
These steps describe how to add and configure the Zivver SSO application in HelloID.
- Go to the HelloID Administrator Portal.
- Navigate to Applications.
- Click Applications again.
- Open the Application Catalog.
- Search for Zivver.
Zivver should appear in the list of results. If it does not, contact Tools4Ever via their support page. - Select Add to add the Zivver app to the catalog.
- Click Next.
- In the Single Sign-On tab, change the Issuer to your organization’s portal name.
- In the X509 Certificate dropdown menu, select the certificate you imported or generated earlier, or select an existing one.
- Click Next.
- In the Self Service tab, choose whether to automatically create a Self Service product.
This makes the application available to users on request. - Click Next.
- In the Finish tab, click Save to add the application to HelloID.
The application is now configured in HelloID.
Application metadata
Metadata is required for the connection between HelloID and Zivver. Follow these steps to retrieve it.
- Select the Zivver application in the HelloID catalog.
- In the application overview, click Edit to view its properties.
- In the top-right corner, right-click Download metadata.
- Select the option to copy the URL.
- Save this URL.
You will need it later.
Configure attribute mapping
- Select the Zivver application in the HelloID catalog.
- In the application overview, click Edit to view the properties.
- In the Configuration tab, click Configure Mapping Set.
- Click Proceed.
- Next to SAML User, click Change mappings.
- Choose one of the following options:
- Mapping with HelloID ZivverAccountKey: for organizations that do not use Microsoft Active Directory as the source for user data in HelloID.
- Mapping with Active Directory ZivverAccountKey: for organizations that use Microsoft Active Directory as the source for user data in HelloID.
Mapping attributes with HelloID
You do not need to modify the mapping. By default, the email address in HelloID is used, and the HelloID UserGUID serves as the ZivverAccountKey.
User | HelloID Claim Set |
---|---|
f(x) {{user.contactEmail}} | NameID |
f(x) {{user.userGUID}} | ZivverAccountKey |
Mapping attributes with Active Directory
If your Zivver accounts are created based on data from Microsoft Active Directory, HelloID must provide the same information (i.e., username and ZivverAccountKey) when creating and logging in to accounts. If this configuration is incorrect, HelloID cannot decrypt user mailboxes, and users will be prompted to enter a password.
- Verify that an Active Directory configuration is set up for your HelloID organization.
Create or manage an Active Directory configuration - Ensure that the “objectGUID” attribute from Active Directory is mapped to a HelloID attribute.
Edit a mapping set - Enter this information in the Mapping for SAML User panel (reference screenshots):
User | HelloID Claim Set |
---|---|
f(x) {{user.contactEmail}} | NameID |
f(x) {{user.attributes.ADObjectGUID}} | ZivverAccountKey |
- Click the f(x) icon next to {{user.attributes.ADObjectGUID}}.
- Select Encode to Base64.
- Save the changes.
- Close the configuration panel.
Configure SSO in Zivver
This section describes how to import the HelloID metadata into Zivver. The metadata URL was retrieved in Application metadata.
- Log in to the Zivver WebApp.
- Click
Organization Settings.
- Expand
User administration.
- Click Single Sign-on.
- Select Automatically recommended.
- Paste the URL copied from the previous section.
- Click .
- Click in the top-right corner.
Zivver is now configured for Single Sign-On.
Zivver 2FA exemption (optional)
By default, Zivver accounts are protected with two-factor authentication (2FA). 2FA is also required when logging in via SSO. However, you can disable 2FA in Zivver for users who log in via SSO through HelloID. You need to know which Authentication Method is passed from HelloID to Zivver to configure this exemption. In SAML, this is called the Authentication Context.
HelloID always returns the following Authentication Context in the SAML response:
urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport
Follow these steps to configure the 2FA exemption for HelloID in Zivver:
- Log in to the Zivver WebApp.
- Click
Organization Settings.
- Expand
User administration.
- Click Single Sign-on.
- Scroll down to the Zivver 2FA exemptions card.
- In the Authentication methods to be exempted field, enter:
urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport
- Click .
You have now successfully set a 2FA exemption for HelloID. When users log in via SSO, Zivver will not request 2FA.
Log in to the WebApp with SSO
- Go to the Zivver WebApp.
- Enter your email address.
- Depending on your role in Zivver:
- Users are redirected directly to the organization’s login screen.
- Administrators can choose between logging in with their Zivver password or workplace credentials.
- Log in with your organization’s credentials.
Depending on whether a 2FA exemption applies, you may be prompted for an additional login method. If a 2FA exemption is in place, this step is skipped. - Enter your additional login factor.
You are now logged in to the Zivver WebApp.
Log in to Outlook with SSO
In the Zivver Office Plugin for Outlook, you can log in via SSO using these steps:
- Click the Zivver tab.
- Click
Manage accounts.
- Click the link add_circle Add an account.
- Enter the email address you want to use for login.
- Click .
You will be redirected to your organization’s login screen. - Log in with your organization’s credentials.
Depending on whether a 2FA exemption applies, you may be prompted for an additional login method. If a 2FA exemption is in place, this step is skipped. - Enter your additional login factor.
You are now logged in to Outlook.