I am a Zivver admin
Configure and manage Zivver
SSO with HelloID
Introduction
Zivver supports Single Sign-On (SSO) via HelloID from Tools4Ever, so that users can log in to Zivver with their workplace credentials. This manual describes how to set up SSO as a Zivver administrator.
SSO operates on the basis of Security Assertion Markup Language (SAML) v2.0; in this scenario, HelloID is the Identity Provider (IdP) and Zivver is the Service Provider (SP).
To configure HelloID as an IdP for Zivver, this is necessary:
- You are a Zivver administrator.
- You have access to the HelloID admin portal.
Configure SSO in HelloID
Create or import a certificate
A certificate is necessary for the SSO connection. If there is no certificate for your organization, follow these steps to import or create a certificate in HelloID. In this example, a self-signed certificate is created:
- Go to the HelloID Administrator Portal.
- Select Settings.
- Go to Certificates.
- Import or create a certificate in HelloID:
You now have a certificate. HelloID can now securely communicate with Zivver.
Install and configure the Zivver HelloID application
These steps describe how to add and configure the Zivver SSO application in HelloID.
- Go to the HelloID Administrator Portal.
- Navigate to Applications.
- Click Applications again.
- Open the Application Catalog.
- Search for Zivver.
Zivver should appear in the list of results. If it does not, please contact Tools4Ever via their support page. - Select Add to add the Zivver app to the catalog.
- Click Next.
- In the Single Sign-On tab, change the Issuer to your organization’s portal name.
- In the X509 Certificate dropdown menu, select the certificate you imported or created in the previous section, or select an existing certificate.
- Click Next.
- In the Self Service tab, choose whether or not to automatically create a Self Service product.
This makes the application available on request to users. - Click Next.
- In the Finish tab, click Save to add the application to HelloID.
The application is now set up in HelloID.
Application metadata
The metadata is necessary for the connection between HelloID and Zivver. Follow these steps to retrieve the metadata.
- Select the Zivver application in the HelloID catalog.
- In the application overview, click Edit to view the properties.
- In the top-right corner, right-click the button Download metadata.
- Select the option to copy the URL.
- Save this URL.
You will need this URL in a later section.
Configure attribute mapping
- Select the Zivver application in the HelloID catalog.
- In the application overview, click Edit to view the properties.
- In the Configuration tab, click Configure Mapping Set.
- Click Proceed.
- Next to SAML User, click Change mappings.
- When changing mappings, there are 2 options. Choose the option that applies to your organization:
- Mapping with HelloID ZivverAccountKey - Use this option if your organization does not use Microsoft Active Directory as source for user data in HelloID.
- Mapping with Active Directory ZivverAccountKey - Use this option if your organization uses Microsoft Active Directory as source for user data in HelloID.
Mapping attributes with HelloID
You don’t need to change the mapping, by default the email address in HelloID will be used and the HelloID UserGUID will be used as ZivverAccountKey.
User | HelloID Claim Set |
---|---|
f(x) {{user.contactEmail}} | NameID |
f(x) {{user.userGUID}} | ZivverAccountKey |
Mapping attributes with Active Directory
When you create Zivver accounts based on data from Microsoft Active Directory, you need to configure HelloID in such a way that it provides the same information (i.e. username and ZivverAccountKey) when creating accounts and when logging an account in. If this is not done correctly, HelloID cannot decrypt the user mailbox and the user will be asked to fill in a password.
- Make sure you have configured an Active Directory configuration for your HelloID organization.
Create or manage an Active Directory configuration - Make sure Active Directory’s “objectGUID” is mapped to a HelloID attribute.
Edit a mapping set - Enter this information in the Mapping for SAML User panel Screenshots:
User | HelloID Claim Set |
---|---|
f(x) {{user.contactEmail}} | NameID |
f(x) {{user.attributes.ADObjectGUID}} | ZivverAccountKey |
- Click the f(x) icon next to {{user.attributes.ADObjectGUID}}.
- Select the option Encode to Base64.
- Save the changes.
- Close the configuration panel.
Configure SSO in Zivver
This section of the manual describes how to import the HelloID metadata into Zivver. The URL for this metadata was retrieved from HelloID in the section Application metadata.
- Log in to the WebApp.
- Click the room_preferences Organization Settings icon at the bottom left of your browser window.
- Go to people_outline User administration.
- Go to Single Sign-on.
- Select Automatically.
- Paste the App Federation Metadata Url copied to your clipboard from the previous section.
- Click Save.
- On to of the page, click the key Enable Single sign-on button.
Zivver is now set up to work with Single Sign-On.
Zivver 2FA exemption (optional)
By default, Zivver accounts are protected with an additional login method (2FA). 2FA is also required when logging in via SSO. However, it is possible to disable 2FA in Zivver when users log in with SSO via HelloID. You need to know which Authentication Method is passed from HelloID to Zivver in order to exempt 2FA in Zivver. In the SAML standard, this is called Authentication Context.
HelloID will always return this Authentication Context in the SAML response:
urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport
Zivver strongly recommends to enforce 2FA for users within HelloID if you use this option! Refer to
2FA Management from HelloID.
Do these steps to set up the 2FA exemption for HelloID in Zivver:
- Log in to the WebApp.
- Click the room_preferences Organization Settings icon at the bottom left of your browser window.
- Go to people_outline User administration.
- Go to Single Sign-on.
- Scroll down to the Zivver 2FA exemptions card.
- In the Authentication methods to be exempted field, enter these value:
urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport
- Click Save.
You have now successfully set a 2FA exemption for HelloID. When users log in via SSO, Zivver will not ask for 2FA.
Test SSO in the Zivver Web App
Do these steps to test the login process via SSO in the Zivver Web App:
- Go to the Zivver Web App.
- Enter your e-mail address.
- Depending on your role in Zivver:
- As a user: You are immediately redirected to the login screen of your organization.
- As an administrator: You choose between your Zivver password and your workplace login details to log in.
- Log in with the workplace login data of your organization.
Depending on the existence of a 2FA exemption, you will be asked for an extra login method. With a 2FA exemption in place, the last step will be skipped. - Enter your extra login factor (2FA).
You are logged in to Zivver Web App.
Test SSO in the Zivver Office Plugin
Do these steps to test the login process via SSO in the Zivver Office Plugin in Outlook:
- Click the Zivver tab in Outlook.
- Click Manage accounts account_circle .
- Click the link Add an account add_circle .
- Select the e-mail address with which you want to log in.
- Click Yes, I want to log in now.
You will be redirected to the login screen of your organization. - Log in with the workplace login details of your organization.
Depending on the existence of a 2FA exemption, you will be asked for an extra login method. With a 2FA exemption in place, the last step will be skipped. - Enter your extra login factor (2FA).
You are logged in to the Zivver Office Plugin.