What is federated identity?
Federated Identity gives customers the option to use their own familiar company credentials to sign into CSI software and website instead of using their CSI sign-in credentials. This is sometimes referred to as SSO (Single Sign On). To implement, the company will have to federate their identity platform (IdP) with CSI’s identity platform. Once setup, all contacts with federated email domains will automatically be redirected to their IdP for authentication.
...
- For users with Microsoft Active Directory (Azure Active Directory, Active Directory, ADFS, AD/LDAP):
To start the process, you will need to do the following as stated in this document under Step 1, Register your app with Azure AD: https://auth0.com/docs/authenticate/identity-providers/enterprise-identity-providers/azure-active-directory/v2v2#register-your-app-with-azure-ad
- You will need to register an App in your Azure AD
- Create a Client Secret (we will need the Secret Value, not the Secret ID)
- Add permissions (per document above)
- In the App Registration, create the following web URI Redirect: https://identity.csiamerica.com/login/callback
- For users with Google Workspace:
To start the process, you will need to do the following as stated in this document under Step 1, Set up your App in Google: https://auth0.com/docs/authenticate/identity-providers/enterprise-identity-providers/google-appsapps#set-up-your-app-in-google
- For users with OpenID Connect:
To start the process, you will need to do the following as stated in this document under Step 1, Set up your App in the OpenId Connect Identity Provider: https://auth0.com/docs/authenticate/identity-providers/enterprise-identity-providers/oidcoidc#set-up-your-app-in-the-openid-connect-identity-provider
- For users with Okta:
To start the process, you will need to do the following as stated in this document under Create Okta OIDC App Integration: https://auth0.com/docs/authenticate/identity-providers/enterprise-identity-providers/okta#create-okta-oidc-app-integration
- Set up an Okta OIDC app integration
- Select OIDC as the Sign-in method.
- Select Web application as the Application type, and set the following parameters:
- Name of your application
- Sign-in Redirects URI: https://identity.csiamerica.com/login/callback
- Trusted Origins: https://identity.csiamerica.com
- Record the Client ID and Client Secret that Okta generates for your app integration.
...
To start the process, you will need to do the following as stated in this document under Step 1Sections, Get the Signing Certificate from the Idp and Convert it to Base64: https://auth0.com/docs/authenticate/identity-providers/enterprise-identity-providers/ping-federate-federate#get-the-signing-certificate-from-the-idp
- For users using SAML:
To start the process, you will need to do the following as stated in this document under Step 1 and 2, Enter the Post-back URL and Entity ID at the IdP, Get the Signing Certificate from the Idp and Convert it to Base64: https://auth0.com/docs/authenticate/identity-providers/enterprise-identity-providers/saml
...