Form.com and Key Survey applications can be configured to allow the Single Sign-On via SAML 2 using Service Provider (SP) initiated POST binding scheme. (http://en.wikipedia.org/wiki/SAML_2.0#HTTP_POST_Binding).
This document describes the configuration settings in the application and on the Identity Provider side that should be made to make SAML Single Sign On possible.
Please note that when SAML is used, the user must exist in the application database. So before the user may authenticate, a user record must be created in the application with the User Login matching the User ID returned by the Identity Provider. Depending on the type of the user one of the following methods may be used to add users into the application:
- Adding user account via Enterprise Admin pages
- Adding a sub-account user to a Multi-Access account
- Adding a sub-account user to Multi-User account
- Adding a Portal User to access portals and mobile apps
- When configuring the Contact Manager and the Portal in the Form.com application, ensure that the column with the “User-Principal-Name” is present in the Contact Manager and that this column is used as a “Login” field in the Portal.
If your account type is Branded/ Private Label, the parameters below have to be provided to FORM. If you have a Self-Hosted instance of the application, these parameters have to be added to the config.properties file of the application.
SAML2_IDP_CERT.SURVEY=-----BEGIN CERTIFICATE-----<CERTIFICATE_PUBLIC_KEY>-----END CERTIFICATE-----
- <IDENTITY_PROVIDER_NAME> - replace the tag with a name of the identity provider. For example, COMPANYIDP
- <SERVICE PROVIDER IDENTIFIER> - replace the tag with the WORLDAPPSP value.
- <CERTIFICATE_PUBLIC_KEY> - replace the tag with a certificate public key provided by the identity provider.
<CERTIFICATE_PUBLIC_KEY>- this parameter should have multiple lines in the config file. Every line must end with "\n\", except for the line where certificate ends.
- <AUTHENTICATION_URL> - specify a URL to the authentication page on the identity provider. Users will be redirected to this page when they try to access a resource that requires authentication without an active session.
Response from Identity Provider
The application is expecting one user parameter in return from the identity provider - NameID, which must match the login name of a user in the FORM system. If the system cannot find the user with such login name, HTTP 401 error response will be sent to the user.
Single Sign-On Configuration Documentation
Below you may find the PDF documents with the full description of Single Sign-On configuration: