SAML 2.0
SEI supports Single sign-on (SSO) integration using the SAML 2.0 protocol. This enables secure, unified authentication with enterprise identity providers and allows users to seamlessly access SEI across your organization.
For details on SAML token claims and advanced configuration, see Customize SAML token claims.
For security and compliance reasons:
- Avoid multitenant configurations – use single‑tenant to reduce cross‑tenant access risks.
- Avoid using email as the user identifier – emails can change and may not be unique. Prefer claims such as
oidorsub.
| SSO method | Description |
|---|---|
| Azure | Configure secure SAML SSO between Azure Active Directory and SEI, enabling users to log in with their Microsoft credentials. |
| Okta | Set up SAML SSO integration with Okta for both SEI and the Excel Add-in. Create a separate Okta application for each. |
| OneLogin | Implement SAML SSO using OneLogin for centralized user access to SEI and the Excel Add-in. Create a separate application for each component. |
Azure single sign-on
Configure the Azure domain
- Log in to Microsoft Azure portal.
- In Azure services, select Enterprise applications. Click More services if you don't see it.
- Click New application, then Create your own application.
- Enter a name for your application and click Create.
- Under Getting Started, click Set up single sign on.
- Select SAML as the SSO method.
- Complete the Basic SAML Configuration and User Attributes & Claims sections.
Basic SAML Configuration
- In the Single sign-on tab, click the pencil icon next to Basic SAML Configuration.
- In the Identifier (Entity ID) field, copy the Entity ID URL value from SEI.
Example: For server addressbiwebserver.mycompany.com:444, use the unique identifier from your server or certificate. - In Reply URL (Assertion Consumer Service URL), copy the ACS (SAML2) URL from SEI for both the application and the Excel Add-in.
- In Sign on URL, enter the direct login URL for your web application (for example,
https://yourserver:81). - Click Save to apply changes.
- Go to the Users and groups tab.
- Click Add user/group to assign users and groups for SSO access.
User attributes & claims
- In the Single sign-on tab, click the pencil icon next to User Attributes & Claims. The Manage Claim page appears.
- Click Add new claim.
- For Name, enter
mailnickname. - In Source, select Attribute.
- For Source Attribute, enter
user.mailnickname. - Click Save to finish.
Download the certificate
- In the Single sign-on tab, scroll to SAML Certificates.
- Click Download next to Certificate (Base64).
- Log in to SEI and complete the configuration by adding Azure as a provider in Authentication.
For a full configuration example, see Microsoft Azure Configuration Example.
Okta single sign-on
If you see Unable to find the user identifier in the claims error, manually set claims under the Attribute Statements section in Okta. This usually means the required user attribute was not included in the SAML response.
Configure claims to match the user identifier defined on the Authentication page.
Create SAML applications
Create two applications—one for SEI and one for the Excel Add-in.
- Sign up for a developer account on Okta.
- In the Okta dashboard, click Applications in the main menu.
- Click Create App Integration.
- Choose SAML 2.0 as the sign-on method and click Next.
Configure app details
Repeat the following for each app:
- In App name, enter a name, such as
SAML 2 Web ServerandSAML 2 Excel Add-in. - Click Next.
- In Single Sign on URL, copy the ACS (SAML2) URL from SEI.
- In Audience URI (SP Entity ID), copy the Entity ID URL from SEI.
- Click Next, then Finish.
Assign users and retrieve identity provider details
- Under the Assignments tab, click Assign to add users who should have SSO access.
- Download the Okta certificate for this application.
- Go to the Sign On tab and select View Setup Instructions.
- Note the Single Sign-On URL and Identity Provider Issuer (Entity ID)—you’ll need these for the SEI SSO configuration.
- Log in to SEI and complete the configuration by adding Okta as a provider in Authentication.
For a full configuration example, see Okta Configuration Example.
OneLogin single sign-on
To integrate SEI with OneLogin using SAML 2.0, create two applications—one for SEI and one for the Excel Add-in.
Create SAML applications
Repeat these steps for each application:
- Log in to your OneLogin domain.
- Click Applications on the menu, then choose Add App.
- Search for and select SAML Custom Connector (Advanced).
- Enter an application name:
- Use
SAML 2 Web Serverfor SEI. - Use
SAML 2 Excel Add-infor the Excel Add-in.
- Use
- In the Configuration tab, set the following:
- Audience (Entity ID): Enter the Entity ID from SEI.
- ACS (Consumer) URL Validator: Enter the validator value for your ACS/Consumer URL.
- ACS (Consumer) URL: Enter the ACS (SAML2) URL from SEI.
- Go to the SSO tab and make sure SML Signature Algorithm is set to
SHA-256. - Copy the Issuer URL, SAML 2.0 Endpoint (HTTP), and SLO Endpoint (HTTP) for use in SEI SSO configuration.
- Click Save.
- Log in to SEI and complete the configuration by adding OneLogin as a provider in Authentication.
For a full configuration example, see OneLogin Configuration Example.