Single Sign-On (SSO)

Single Sign-On (SSO) is a system that allows you to use one set of login credentials to access multiple applications without having to re-enter their credentials for each individual application. With SSO, you can easily access the MoEngage dashboard using your organization's central identity provider (IdP).

Advantages of SSO

The advantages of using SSO include:

  • Simplified user experience: SSO eliminates the need for users to remember and manage multiple usernames and passwords for different applications, making the login process much easier and faster.
  • Reduced password fatigue: By consolidating credentials, SSO reduces the burden on users to remember and manage numerous passwords, which can lead to security risks and frustration.
  • Enhanced security: Centralized authentication with SSO allows for more effective security controls, such as stronger password policies and multi-factor authentication, and simplifies the process of managing user access and permissions.
  • Improved productivity: SSO allows users to spend less time on login processes and more time on core work tasks, leading to increased productivity and efficiency.
  • Reduced IT costs: SSO streamlines user access management, reducing the workload for IT teams and minimizing the need for password resets and support calls, leading to cost savings.

SSO Configuration

MoEngage supports SSO using Security Assertion Markup Language (SAML) 2.0 and acts as an SSO service provider (SP). SAML is an industry-standard protocol that enables user authentication delegation similar to OAuth 2.

Upon login, you are redirected to your internal or external SSO system for authentication and then returned to MoEngage when the response is verified.

Screenshot_2022-10-18_at_9.39.29_AM.png

info

Information

  • Contact your organization's IT team to set up SSO to log in to the MoEngage dashboard.
  • Only administrators can enable SSO for a workspace, which allows their teammates to log in securely using the identity provider credentials.
  • To configure SSO, you need an Admin role with the Setup & manage permission for the Login Settings component.

Identity Providers (IdPs)

MoEngage uses Identity Providers (IdPs) to simplify and centralize user login. This allows you to securely access MoEngage services using SSO based on the SAML 2.0 standard. MoEngage supports the following IdPs currently:

  • Okta
  • Onelogin
  • Azure (Microsoft Entra ID)
  • Google Admin
  • Other (you can configure other IdPs, provided they are SAML 2.0 compliant)

To enable SSO in the MoEngage dashboard, perform the following steps:

  1. On the left navigation menu in the MoEngage dashboard, click Settings > Account > Security.
  2. On the Security page, click the Login tab.
  3. Click Single Sign On (SSO) only.
  4. Under Single sign on, click Configure SSO.

    The Configure SSO dialog box appears.
  5. In the Identity Provider list, select your identity provider.

    Now, you must switch to that specific IdP admin console to configure the SSO settings and ensure the SSO integration between MoEngage and the selected IdP functions as intended.
    info

    Information

    If your preferred identity provider is not available in the Identity Provider list, you can select Other to configure your SSO. This function works with any SAML 2.0-compliant provider.

Configure Okta SSO Configure Onelogin SSO Configure Microsoft Azure SSO Configure Google Admin SSO Configure Other SSO

To set up SSO with Okta, perform the following steps:

  1. Navigate to the Okta Admin Console.
  2. On the left navigation menu, click Applications > Applications.
  3. On the Applications page, click Create App Integration.

    The Create a new app integration pop-up window appears.
  4. Click the SAML 2.0 option and then click Next.

    The Create SAML integration page appears. You are taken to the first step, General Settings, to define your app.
  5. Enter the following details:
    Field Required Description
    App name Yes

    Type your app name.

    App logo Optional Upload an image file (typically PNG, JPG, or GIF) to serve as your application icon.
    Note: The image file must be smaller than 1 MB.
    App visibility Optional Select the Do not display application icon to users check box adjacent to App Visibility to hide the application icon from the users.
  6. Click Next. You will move to the second step, Configure SAML, to define the SAML settings.
  7. On the Configure SSO dialog box in the MoEngage dashboard, copy the Single sign-on URL and Audience URI (SP Entity ID).
  8. Under SAML Settings, enter the following details:
    Field Required Description
    Single Sign-On URL Yes

    This URL receives the SAML assertion (the authentication response) from Okta to MoEngage.

    Paste the URL copied from the MoEngage dashboard.

    Audience URI (SP Entity ID) Yes

    This URL informs Okta about the specific application (MoEngage) for which the authentication assertion is intended.

    Paste the URI copied from the MoEngage dashboard.

    Note: In this box, you can add multiple entity IDs from different workspaces, separated by commas.

    Name ID format Yes

    Select EmailAddress.


  9. Scroll to the end of the page and click Next. You are taken to the third step, Feedback.
  10. Select the This is an internal app that we have created check box adjacent to the App type.
  11. Click Finish. You must now generate the SAML Signing Certificates to connect your app to Okta.
  12. By default, you are on the Sign On tab. Scroll to the end of the page, and under SAML Signing Certificates, find the Status marked as Active to download the certificate.
  13. Click the Actions arrow in the Actions column.
  14. Click Download certificate.

    The metadata will be downloaded in an XML file.
  15. Upload the downloaded XML file in the Enter XML Configuration box on the Configure SSO dialog box of the MoEngage dashboard.
  16. By default, the Update the same config for Test Environment check box is selected. When it is selected, the configuration is applied to both the test and live environments. Clear the check box if you want the configuration to be applied only to the live environment.
  17. Click Configure

    The Alert pop-up window will appear, prompting you to review the instructions properly.
  18. Select the Send email to the users of this workspace check box to notify all users about your workspace's Single Sign-On (SSO) enablement.
  19. Click Done.

    The SSO configuration is now successfully completed. You can see the Okta SSO on the Login tab.

 

FAQs

arrow_drop_down Facing an issue while logging in?

Screenshot_2019-10-16_at_2.55.10_PM.png

Authentication Failed

This generally happens when the SAML authentication with the Identity Provider fails. Please contact your identity provider for details. 

Persistent Error

MoEngage supports the admin login using an email id - password combination. The Admin can go back to the Single Sign On screen (Go to settings > Security Settings) and disable SSO.

arrow_drop_down Facing an issue while uploading the config file?

Screenshot_2019-11-14_at_2.17.20_PM.png

This generally happens when the uploaded XML file is invalid. Try again with the correct XML file. If the issue persists, check with your identity provider.

arrow_drop_down Which identity providers are supported by MoEngage?

MoEngage supports all identity providers (IdPs) that support SAML 2.0

arrow_drop_down Can different identity providers be used for different workspaces?

Yes, you can configure different identity providers for different workspaces. For example, you can use Okta to configure SSO for one workspace and Google for another. You can also have different identity providers for test and live environments.

arrow_drop_down Which identity provider (in case of multiple IdPs) will the user be redirected to after logging in?

The user will be redirected to the IDP associated with the most recent workspace that they used before the last session ended.

arrow_drop_down Is there a test environment using which SSO implementation can be tested?

You can use the test environment to test the SSO setup and verify that everything works as desired. Once you have verified it on the test, you will need to set up SSO again on the live environment. On the other hand, SSO gets configured to the test environment automatically if you configure it first in the live environment.

arrow_drop_down What happens if the user exists in the identity provider’s directory but not in MoEngage?

The user will not be able to log in to MoEngage if the user is not a part of the workspace in which the SSO has been enabled.

arrow_drop_down What happens if the user exists in the identity provider’s directory but does not have access to the SSO workspace linked with MoEngage?

The user will see the Auth Status Failure error on the MoEngage Dashboard while being redirected back from the identity provider.

arrow_drop_down Who can enable/disable SSO for a workspace on MoEngage?

The SSO can only be enabled / disabled / edited by a user with access to the Setup & Manage permission under Login Settings.

The user with the necessary permissions can go to Settings -> Login -> Authentication, select Single Sign On (SSO) Only, and perform the necessary action.

arrow_drop_down What happens if the SSO is not enabled for one of the workspaces or if different identity providers have been used for different workspaces?

If SSO is not enabled for one of the workspaces or if different identity providers have been used for the workspaces, the user will need to re-authenticate while switching between them.

arrow_drop_down What happens if the user wants to seamlessly switch between different workspaces after enabling SSO?

To switch between different workspaces without re-authenticating seamlessly, the user will need to enforce SSO on all the workspaces with the same identity provider in both the Test and Live environments.

arrow_drop_down Can we configure SSO to allow a specific set of users to log in using SSO and others to log in with ID and Password?

Only the admins have the option to log in using their MoEngage credentials once SSO is enabled. All other users must log in through SSO.

arrow_drop_down When using Microsoft Azure, what should be the value of the User Principal Name (UPN) attribute?

UPN consists of a UPN prefix (the user account name) and a UPN suffix (a DNS domain name). The prefix is joined with the suffix using the "@" symbol. For example, "someone@example.com". A UPN must be unique among all security principal objects within a directory. Read more about it here.

arrow_drop_down What are some of the common issues faced by the users?

Here are some of the common issues faced and their resolutions.

Error Resolution
Incorrect Cluster URL Ensure that the correct login URL (as per your data center) is used to log into your MoEngage Dashboard. For more information, refer to Data Centers.
Incorrect Name ID Format The Name ID Format should be in the format mentioned below: urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress
Missing Single Sign On URL The Single Sign On URL should be present with a valid value in the SAML metadata file.
NameIDFormat
<NameIDFormat>urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress</NameIDFormat> <NameIDFormat>urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified</NameIDFormat> <NameIDFormat>urn:oasis:names:tc:SAML:1.1:nameid-format:X509SubjectName</NameIDFormat> <NameIDFormat>urn:oasis:names:tc:SAML:1.1:nameid-format:WindowsDomainQualifiedName</NameIDFormat> <NameIDFormat>urn:oasis:names:tc:SAML:2.0:nameid-format:kerberos</NameIDFormat> <NameIDFormat>urn:oasis:names:tc:SAML:2.0:nameid-format:entity</NameIDFormat> <NameIDFormat>urn:oasis:names:tc:SAML:2.0:nameid-format:persistent</NameIDFormat> <NameIDFormat>urn:oasis:names:tc:SAML:2.0:nameid-format:transient</NameIDFormat>
arrow_drop_down Does two-factor authentication remain enabled even after enabling SSO authentication?

Yes, two-factor authentication remains enabled even after you enable SSO for a workspace.

 

Was this article helpful?
10 out of 20 found this helpful

How can we improve this article?