Socialcast now offers a self-service Single Sign-On configuration option. As a standalone service provider, Socialcast is able to consume information directly from your Identity Provider, as long as it supports SAML 2.0. This simplifies the SSO configuration process, reduces maintenance costs, and allows community admins and IT teams to easily implement SSO without dependencies on VMware Professional Service consultants. Follow the steps below to configure SSO for your Socialcast community.
Note: SSO is not available for Socialcast Free accounts; it is only available for paid communities.
- Under Admin Settings > Security > SSO Configuration, click ‘New SAML Configuration’ to create a new configuration.
- Begin by importing the Metadata file, in XML or SAML format, from your IdP Metadata URL.. Alternatively, you can export the Metadata file from your computer and upload it. Click the Import button to import the Metadata.
- Next, enter a Name for your configuration. Note: The IdP SSO Target URL, IdP Certificate Fingerprint, and IdP Certificate Expiration fields are automatically populated after you Import the Metadata file.
- Map the First Name Field, Last Name Field, and Email Field. The Location Field is optional. Note: You can use commas to specify a fallback field in case the original field is blank for each of these. For example, “first_name, nickname” which would make nickname the field used in case the value passed in first_name was blank.
- Click the Submit button to save your New SAML Configuration. Note: We recommend running a test prior to enabling the configuration, leaving the Enabled flag unchecked at this time.
- To export the Service Provider metadata, select View SP Descriptor from the drop-down Settings menu next to your configuration. After the SP Descriptor file has been downloaded, import it to your IdP according to your IdP’s instructions.
- Test your configuration by selecting Test from the drop-down Settings menu of your New SAML Configuration.
- Once you login into your SSO Identity Provider, you will see the test results. Ensure all fields are set correctly and contain the expected values.
Any errors are shown here.
- Once testing has been successful, enable the Configuration by checking the Enabled box next to your SAML Configuration. Once the SAML Configuration is enabled, SSO is available to all users.