Authentication and Single Sign-On (SSO)

<< Click to Display Table of Contents >>

Navigation:  Administration > System Settings >

Authentication and Single Sign-On (SSO)

Previous pageReturn to chapter overviewNext page

This feature requires the appropriate license.

Generic CAS, SAML and Proprietary Authentication methods

The Central Authentication Service (CAS) and Security Assertion Markup Language (SAML) are single sign-on protocols for the web. If your institution supports CAS or SAML, it can be configured in Xitracs to authenticate users.

Alternatively, proprietary SSO services such as ADFS, Azure, Cisco Duo and Okta may be configured.

 

Contact your institution's network administrator to set up the correct parameters for your SSO server.

 

If the Auto logon parameter is set, a user will redirected automatically to the institution's sign in and, once authenticated, logged into Xitracs.

icon_alert2Do not enable auto logon until you have tested and confirmed that authentication is working correctly.

LDAP Authentication (Only available for local on-site installations).

To enable the Xitracs system to authenticate users via the LDAP server, the following parameters should be set:

1.Check Enabled

2.Enter LDAP Server URL

3.Enter User Path

4.Optionally, enter Active Directory Domain or for iPlanet specify the domain to prepend to the logins

5.Check Fallback to local password, if required

6.Enter Additional Servers, if required

7.Click Submit

Note: LDAP Is used for user authentication puposes only. No provisioning from Active Directory is supported.

LDAP support is available for up to four servers. A user attempting to login to the system will be authenticated against the primary LDAP server. If no valid user is found then the next additional LDAP server in the sequence will be searched.  If the user is not found in any additional server, the user will be rejected.