Skip to content

Commit

Permalink
fix(saml original): fix anchor links
Browse files Browse the repository at this point in the history
  • Loading branch information
zuluecho9 committed Jan 28, 2022
1 parent 1e2706f commit c98a057
Showing 1 changed file with 25 additions and 25 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -39,7 +39,7 @@ These docs are for setting up SSO for users on our [original user model](/docs/a

Single Sign On (SSO) allows a computer user to log in to multiple systems via a single portal. If you are a New Relic account Owner setting up SSO integration for your organization, you must obtain a [SAML](/docs/accounts-partnerships/education/getting-started-new-relic/glossary#saml) certificate that identifies the SSO login URL (and possibly logout URL) for your organization. The other types of information required for SSO integration will vary depending on the SAML service provider being used.

## Requirements
## Requirements [#requirements]

Requirements include:

Expand Down Expand Up @@ -200,21 +200,21 @@ After obtaining your [SAML identity provider certificate](/docs/subscriptions/sa
Access to this feature depends on your subscription level. If your account is set up under a [customer partnership](/docs/new-relic-partnerships/partner-integration-guide/partner-account-maintenance/partnership-accounts-users-subscriptions#partnerships), access to this feature will also depend on the settings for that partnership subscription level.
</Callout>

## Requirements
### Requirements

For requirements, including which New Relic users this feature applies to, see [Requirements](/docs/accounts/accounts/saml-single-sign/saml-service-providers#requirements).
For requirements, including which New Relic users this feature applies to, see [Requirements](#requirements).

## Parent and child accounts [#parent]
### Parent and child accounts [#parent]

If your account has child accounts, typically you will set up the SSO configuration on the parent account level only. The child account users will still be able to log in through SSO because they will inherit the parent account's SAML SSO configuration. If you need to configure multiple accounts with separate SAML identities (for example, with partnership accounts), use the [custom entity ID feature](/docs/accounts-partnerships/accounts/saml-single-sign/configure-saml-multiple-accounts).

## Configure SSO [#configuring]
### Configure SSO [#configuring]

To help ensure security and account for network time and clock skews, configure your SAML identity provider's validation responses to the shortest time period that is practical (for example, five minutes). New Relic allows a maximum of thirty minutes.

To set up your SSO configuration for users on our [original user model](/docs/accounts/original-accounts-billing/original-product-based-pricing/overview-user-models):

1. Read about an option to have [users bypass SAML SSO](/docs/accounts/accounts/saml-single-sign/add-users-saml-accounts#bypassing) if they use domains you own.
1. Read about an option to have [users bypass SAML SSO](#add-users-saml) if they use domains you own.
2. Go to: **[account dropdown](/docs/accounts-partnerships/education/getting-started-new-relic/glossary#account-dropdown) > Account settings > Security and authentication > Single sign on**.
3. From the **SAML Single Sign On** page, review your New Relic SAML service provider details.
4. To upload your SAML identity provider certificate, select **Choose file**, then follow standard procedures to select and save the file.
Expand All @@ -226,13 +226,13 @@ To set up your SSO configuration for users on our [original user model](/docs/ac
If your organization does not use a specific redirect URL, New Relic provides a logout landing page by default.
</Callout>

## Test SSO [#testing]
### Test SSO [#testing]

After you correctly configure and save your SSO settings, the **Test** page automatically appears. After each test, New Relic returns you to the SAML SSO page with diagnostic results.

To go back and change your configuration settings, select **1 CONFIGURE**.

## Enable SSO [#enabling]
### Enable SSO [#enabling]

When testing successfully completes, a link appears that you can use on your company's landing page for easy Single Sign On with New Relic. As an additional security measure, users cannot sign in until they [complete the email confirmation](/docs/subscriptions/adding-users-to-saml-accounts) that New Relic sends automatically.

Expand All @@ -242,7 +242,7 @@ After your users select the link in their confirmation email, they can sign in s
If you [disable SAML SSO](/docs/subscriptions/maintaining-sso-settings), New Relic automatically flags all of your **Pending** users as **Active**. If you decide to re-enable SAML SSO later, New Relic automatically flags all users except the Owner as **Pending**, and they will need to confirm their account access by email.
</Callout>

## Add a logout URL for session timeouts [#timeout_url]
### Add a logout URL for session timeouts [#timeout_url]

New Relic's **Session configuration** feature requires a [logout URL](/docs/subscriptions/setting-session-timeouts#saml_session) for SAML SSO-enabled accounts. If you have already configured, tested, and enabled SAML SSO without a logout URL, New Relic automatically prompts the account Admin to notify the account Owner. In addition, if you are the account Owner, New Relic automatically provides a link from **Session configuration** to go directly to SAML Single Sign On and add a logout URL.

Expand All @@ -264,11 +264,11 @@ As an additional security measure for SAML single sign-on (SSO) accounts, users

For accounts **without** SAML SSO integration, the account Owner and Admins can add new users without requiring confirmation.

## Requirements
### Requirements

For requirements, including which New Relic users this feature applies to, see [Requirements](/docs/accounts/accounts/saml-single-sign/saml-service-providers#requirements).
For requirements, including which New Relic users this feature applies to, see [Requirements](#requirements).

## Add and confirm users [#adding]
### Add and confirm users [#adding]

Follow this process to add and confirm users on our [original user model](/docs/accounts/original-accounts-billing/original-product-based-pricing/overview-user-models) that are authenticating via SAML SSO:

Expand All @@ -281,7 +281,7 @@ Follow this process to add and confirm users on our [original user model](/docs/
If you disable SAML SSO, New Relic automatically flags all of your **Pending** users as **Active**. If you decide to re-enable SAML SSO later, New Relic automatically flags all users except the Owner as **Pending**, and they will need to confirm their account access by email.
</Callout>

## Bypass email confirmation [#bypassing]
### Bypass email confirmation

Depending on your [subscription level](https://newrelic.com/application-monitoring/pricing), you may have the option to claim the domain names that you own and bypass the SAML SSO confirmation process. When the account Owner or Administrators add new users and their email address has a domain that matches the account's domains, New Relic automatically adds them as **Active** users.

Expand All @@ -305,11 +305,11 @@ In the SAML protocol, the **entity ID** uniquely identifies the service provider

When you configure multiple New Relic accounts with SAML, your SAML provider typically requires each account to have a unique entity ID. If you need to configure multiple accounts with separate SAML identities, use New Relic's custom entity ID feature.

## Requirements
### Requirements

For requirements, including which New Relic users this feature applies to, see [Requirements](/docs/accounts/accounts/saml-single-sign/saml-service-providers#requirements).
For requirements, including which New Relic users this feature applies to, see [Requirements](#requirements).

## Select custom entity IDs [#custom]
### Select custom entity IDs [#custom]

New Relic's custom entity ID feature allows you to enable a unique entity ID for each of your accounts. You can then configure SAML SSO for them as a distinct application with your SAML provider. This allows you to centrally control user authentication to each of your accounts independently.

Expand All @@ -329,11 +329,11 @@ To select custom entity IDs:
>
After your SAML SSO login is configured, tested, and enabled, all of your New Relic account users (including the account Owner and Admins) must use your organization's SSO URL to sign in to New Relic. Their email address must match what has been set up in New Relic. Also, their ability to use the SSO URL to access applications other than New Relic will depend on their permissions set in those applications.

## Requirements
### Requirements

For requirements, including which New Relic users this feature applies to, see [Requirements](/docs/accounts/accounts/saml-single-sign/saml-service-providers#requirements).
For requirements, including which New Relic users this feature applies to, see [Requirements](#requirements).

## Update SAML SSO info [#sso_procedures]
### Update SAML SSO info [#sso_procedures]

To update SAML SSO information for users on our [original user model](/docs/accounts/original-accounts-billing/original-product-based-pricing/overview-user-models):

Expand All @@ -343,7 +343,7 @@ To update SAML SSO information for users on our [original user model](/docs/acco
4. Optional: To change your existing SAML certificate, select **Choose file**. Follow standard procedures to select and save the file, then save.
5. Optional: To change your existing SSO URLs, copy and paste in (or type) the **Remote login URL** or **Logout landing URL**, then save.

## Email addresses [#user_email]
### Email addresses [#user_email]

<Callout variant="tip">
**Owner or Admins**
Expand All @@ -356,7 +356,7 @@ To update user information for your organization's New Relic account:
1. Go to: **[account dropdown](/docs/accounts-partnerships/education/getting-started-new-relic/glossary#account-dropdown) > Account settings > Account > Summary**.
2. From the **Users** list, select any of the options to add new users, edit existing users' roles, or delete them.

## Troubleshoot SSO login [#troubleshoot]
### Troubleshoot SSO login [#troubleshoot]

No one using the account, including the Owner and Admins, can sign in to New Relic directly. If you get locked out of SSO and need to disable it or change the configuration, get support at [support.newrelic.com](https://support.newrelic.com).
</Collapser>
Expand All @@ -365,7 +365,7 @@ No one using the account, including the Owner and Admins, can sign in to New Rel
id="delete-sso"
title="Delete SSO configuration"
>
For requirements, including which New Relic users this feature applies to, see [Requirements](/docs/accounts/accounts/saml-single-sign/saml-service-providers#requirements).
For requirements, including which New Relic users this feature applies to, see [Requirements](#requirements).

<Callout variant="caution">
If you delete your SAML SSO integration with New Relic, you cannot restore it. However, you can follow standard procedures to set up your configuration again.
Expand All @@ -390,11 +390,11 @@ With [partnership accounts](/docs/new-relic-partnerships/partner-integration-gui

Other Partner accounts, including Heroku, AppDirect, and Microsoft Azure, do not permit direct login to New Relic. In this situation, SAML integration from the partner's site is not supported by the partner SSO. If you have questions, contact your partner representative at New Relic.

## Requirements
### Requirements

For requirements, including which New Relic users this feature applies to, see [Requirements](/docs/accounts/accounts/saml-single-sign/saml-service-providers#requirements).
For requirements, including which New Relic users this feature applies to, see [Requirements](#requirements).

## Example [#example-parent]
### Example [#example-parent]

Your account structure and settings affect whether SAML is available and how it applies to your accounts.

Expand Down

0 comments on commit c98a057

Please sign in to comment.