SAML 2.0
Nectari supports Single sign-on (SSO) integration using the SAML 2.0 protocol. This enables secure, unified authentication with enterprise identity providers and allows users to seamlessly access Nectari across your organization.
For details on SAML token claims and advanced configuration, see Customize SAML token claims.
For security and compliance reasons:
- Avoid multitenant configurations – use single‑tenant to reduce cross‑tenant access risks.
- Avoid using email as the user identifier – emails can change and may not be unique. Prefer claims such as
oidorsub.
| SSO method | Description |
|---|---|
| Azure | Configure secure SAML SSO between Azure Active Directory and Nectari, enabling users to log in with their Microsoft credentials. |
| Okta | Set up SAML SSO integration with Okta for both Nectari and the Excel Add-in. Create a separate Okta application for each. |
| OneLogin | Implement SAML SSO using OneLogin for centralized user access to Nectari and the Excel Add-in. Create a separate application for each component. |
Azure single sign-on
Configure the Azure domain
- Log in to Microsoft Azure portal.
- In Azure services, select Enterprise applications. Click More services if you don't see it.
- Click New application, then Create your own application.
- Enter a name for your application and click Create.
- Under Getting Started, click Set up single sign on.
- Select SAML as the SSO method.
- Complete the Basic SAML Configuration and User Attributes & Claims sections.
Basic SAML Configuration
- In the Single sign-on tab, click the pencil icon next to Basic SAML Configuration.
- In the Identifier (Entity ID) field, copy the Entity ID URL value from Nectari.
Example: For server addressbiwebserver.mycompany.com:444, use the unique identifier from your server or certificate. - In Reply URL (Assertion Consumer Service URL), copy the ACS (SAML2) URL from Nectari for both the application and the Excel Add-in.
- In Sign on URL, enter the direct login URL for your web application (for example,
https://yourserver:81). - Click Save to apply changes.
- Go to the Users and groups tab.
- Click Add user/group to assign users and groups for SSO access.
User attributes & claims
- In the Single sign-on tab, click the pencil icon next to User Attributes & Claims. The Manage Claim page appears.
- Click Add new claim.
- For Name, enter
mailnickname. - In Source, select Attribute.
- For Source Attribute, enter
user.mailnickname. - Click Save to finish.
Download the certificate
- In the Single sign-on tab, scroll to SAML Certificates.
- Click Download next to Certificate (Base64).
- Log in to Nectari and complete the configuration by adding Azure as a provider in Authentication.
For a full configuration example, see Microsoft Azure Configuration Example.
Okta single sign-on
If you see Unable to find the user identifier in the claims error, manually set claims under the Attribute Statements section in Okta. This usually means the required user attribute was not included in the SAML response.
Configure claims to match the user identifier defined on the Authentication page.
Create SAML applications
Create two applications—one for Nectari and one for the Excel Add-in.
- Sign up for a developer account on Okta.
- In the Okta dashboard, click Applications in the main menu.
- Click Create App Integration.
- Choose SAML 2.0 as the sign-on method and click Next.
Configure app details
Repeat the following for each app:
- In App name, enter a name, such as
SAML 2 Web ServerandSAML 2 Excel Add-in. - Click Next.
- In Single Sign on URL, copy the ACS (SAML2) URL from Nectari.
- In Audience URI (SP Entity ID), copy the Entity ID URL from Nectari.
- Click Next, then Finish.
Assign users and retrieve identity provider details
- Under the Assignments tab, click Assign to add users who should have SSO access.
- Download the Okta certificate for this application.
- Go to the Sign On tab and select View Setup Instructions.
- Note the Single Sign-On URL and Identity Provider Issuer (Entity ID)—you’ll need these for the Nectari SSO configuration.
- Log in to Nectari and complete the configuration by adding Okta as a provider in Authentication.
For a full configuration example, see Okta Configuration Example.
OneLogin single sign-on
To integrate Nectari with OneLogin using SAML 2.0, create two applications—one for Nectari and one for the Excel Add-in.
Create SAML applications
Repeat these steps for each application:
- Log in to your OneLogin domain.
- Click Applications on the menu, then choose Add App.
- Search for and select SAML Custom Connector (Advanced).
- Enter an application name:
- Use
SAML 2 Web Serverfor Nectari. - Use
SAML 2 Excel Add-infor the Excel Add-in.
- Use
- In the Configuration tab, set the following:
- Audience (Entity ID): Enter the Entity ID from Nectari.
- ACS (Consumer) URL Validator: Enter the validator value for your ACS/Consumer URL.
- ACS (Consumer) URL: Enter the ACS (SAML2) URL from Nectari.
- Go to the SSO tab and make sure SML Signature Algorithm is set to
SHA-256. - Copy the Issuer URL, SAML 2.0 Endpoint (HTTP), and SLO Endpoint (HTTP) for use in Nectari SSO configuration.
- Click Save.
- Log in to Nectari and complete the configuration by adding OneLogin as a provider in Authentication.
For a full configuration example, see OneLogin Configuration Example.