Integrating with OneLogin
Sign into the OneLogin administration panel to setup a new app connector to Onshape. Go to <yourdomain>.onelogin.com/admin
Onshape signs all outgoing SAML certification requests. You are not required to upload any certificates (for example, a SAML signing certificate), except in the case of ADFS integration because ADFS validates incoming SAML requests. Note that Microsoft also recommends migration from the latest version of ADFS to Microsoft Entra ID. See ADFS Overview for more information.
Add new application
- Select Applications from the top navigation bar.
- Select Applications.
- Click Add App in the upper right corner.
- Search for SAML.
-
Select SAML Test Connector (Advanced).
- Set the Display Name as "Onshape" and use any applicable icons.
- Click Save.
Configuration
Once the application is saved, there are more options that will be available for modification. This next section will setup important application details for the integration. Details about each section can be found on the Test connector configuration page.
- RelayState: Leave blank
- Audience (EntityID): com.onshape.saml2.sp
- Recipient: https://cad.onshape.com/identity/saml2/sso
- ACS (Consumer) URL Validator*: https://cad.onshape.com/identity/saml2/sso$
- ACS (Consumer) URL*: https://cad.onshape.com/identity/saml2/sso
- Single Logout URL: https://<custom_onshape_domain>.onshape.com
- Login URL: https://<custom_onshape_domain>.onshape.com
- SAML not valid before: 3 (Default value)
- SAML no valid on or after: 3 (Default value)
- SAML initiator: OneLogin (this is if you want your portal page to sign directly in)
- SAML nameID format: Email
- SAML issuer type: Specific
- SAML signature element: Assertion
- Encrypt assertion: (Unchecked)
- SAML encryption method: TRIPLEDES-CBC (Default)
- Sign SLO Response: (Unchecked)
- SAML sessionNotOnOrAfter: 1440 (Default)
- Generate Attribute Value tag for empty values: (Checked)
- Sign SLO Request: (Unchecked)
Parameters
This should be configured to pass the appropriate information over to Onshape during the SSO handshake. These values are as follows:
- NameID value: Email (Default value)
-
companyName: Macro type (type in the custom domain name into the field), for example, in a domain that is "company.onshape.com" enter only "company" in this field
- firstName: Map to First Name and include in SAML assertion
- lastName: Map to Last Name and include in SAML assertion
SSO
Here, you will have to set only the SAML Signature Algorithm option.
Download the SAML Metadata
Now that OneLogin is configured and saved, in the upper right corner, pull down the More Actions menu and select SAML Metadata, which downloads an XML file to your local machine. This file will be used in the set up of OneLogin in the Onshape Enterprise Authentication settings.
Once OneLogin is configured, setting up the Onshape Authentication options can be completed.
- Sign into the Enterprise with an Administrator account.
- Click the account name in the upper right corner, select Enterprise settings.
- Select Authentication on the left side filter.
- Click the Configure SSO provider button.
- Give the connection a name: OneLogin
- Select OneLogin from the provider type.
- Click the Upload configuration file button and select the XML file that was downloaded.
- Click OK.
Testing the connection
Now that both Onshape and OneLogin are configured it is time to test. Go to the OneLogin portal and click on the Onshape application. Sign in should be redirected to the Activity page in the Onshape enterprise.