Skip to content

Commit

Permalink
fix(original saml): fix format of 'single sign-on'
Browse files Browse the repository at this point in the history
  • Loading branch information
zuluecho9 committed Feb 16, 2022
1 parent c74d7dd commit f3e163e
Showing 1 changed file with 10 additions and 10 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -37,7 +37,7 @@ For an overview of our SAML SSO and SCIM docs, first read [Introduction to SAML

These docs are for setting up SSO for users on our [original user model](/docs/accounts/original-accounts-billing/original-product-based-pricing/overview-user-models).

Single Sign On (SSO) allows a computer user to log in to multiple systems via a single portal. If you're a New Relic account Owner setting up SSO integration for your organization, you must obtain a [SAML](/docs/accounts-partnerships/education/getting-started-new-relic/glossary#saml) certificate that identifies the SSO login URL (and possibly logout URL) for your organization. The other types of information required for SSO integration will vary depending on the SAML service provider being used.
Single sign-on (SSO) allows a computer user to log in to multiple systems via a single portal. If you're a New Relic account Owner setting up SSO integration for your organization, you must obtain a [SAML](/docs/accounts-partnerships/education/getting-started-new-relic/glossary#saml) certificate that identifies the SSO login URL (and possibly logout URL) for your organization. The other types of information required for SSO integration will vary depending on the SAML service provider being used.

## Requirements [#requirements]

Expand All @@ -49,13 +49,13 @@ Requirements include:

## SSO settings UI page [#ui]

To find the New Relic SSO settings page: from the [account dropdown](/docs/accounts-partnerships/education/getting-started-new-relic/glossary#account-dropdown), click **Account settings**, then click **Security and authentication**, then click **Single sign on**.
To find the New Relic SSO settings page: from the [account dropdown](/docs/accounts-partnerships/education/getting-started-new-relic/glossary#account-dropdown), click **Account settings**, then click **Security and authentication**, then click **Single sign-on**.

If you don't see this UI, review the [requirements](#requirements).

## Providers supported by New Relic [#saml_providers]

For a list of the SAML service providers that New Relic currently supports for SSO integration: From the New Relic title bar, select **([account dropdown](/docs/accounts-partnerships/education/getting-started-new-relic/glossary#account-dropdown)) > Account settings > Security and authentication > Single sign on**.
For a list of the SAML service providers that New Relic currently supports for SSO integration: From the New Relic title bar, select **([account dropdown](/docs/accounts-partnerships/education/getting-started-new-relic/glossary#account-dropdown)) > Account settings > Security and authentication > Single sign-on**.

Providers include:

Expand Down Expand Up @@ -209,7 +209,7 @@ To claim your domain, [contact support](https://support.newrelic.com).
id="set-up-saml"
title="Set up SAML SSO"
>
After obtaining your [SAML identity provider certificate](/docs/subscriptions/saml-service-providers), which should be a PEM encoded x509 certificate, and URL, the account Owner can set up, test, and enable the Single Sign-on (SSO) configuration in New Relic. No other role on the account may edit the SSO configuration on the account.
After obtaining your [SAML identity provider certificate](/docs/subscriptions/saml-service-providers), which should be a PEM encoded x509 certificate, and URL, the account Owner can set up, test, and enable the single sign-on (SSO) configuration in New Relic. No other role on the account may edit the SSO configuration on the account.

<Callout variant="tip">
Access to this feature depends on your subscription level. If your account is set up under a [customer partnership](/docs/new-relic-partnerships/partner-integration-guide/partner-account-maintenance/partnership-accounts-users-subscriptions#partnerships), access to this feature will also depend on the settings for that partnership subscription level.
Expand All @@ -230,10 +230,10 @@ To help ensure security and account for network time and clock skews, configure
To set up your SSO configuration for users on our [original user model](/docs/accounts/original-accounts-billing/original-product-based-pricing/overview-user-models):

1. Optional but recommended: read about [claiming your domain to streamline the SAML SSO process](#domain-allow-list).
2. Go to: **[account dropdown](/docs/accounts-partnerships/education/getting-started-new-relic/glossary#account-dropdown) > Account settings > Security and authentication > Single sign on**.
3. From the **SAML Single Sign On** page, review your New Relic SAML service provider details.
2. Go to: **[account dropdown](/docs/accounts-partnerships/education/getting-started-new-relic/glossary#account-dropdown) > Account settings > Security and authentication > Single sign-on**.
3. From the **SAML single sign-on** page, review your New Relic SAML service provider details.
4. To upload your SAML identity provider certificate, select **Choose file**, then follow standard procedures to select and save the file.
5. Specify the **Remote login URL** that your users will use for single sign on.
5. Specify the **Remote login URL** that your users will use for single sign-on.
6. If your organization's SAML integration provides a redirect URL for logout, copy and paste in (or type) the **Logout landing URL**; otherwise leave blank.
7. Save your changes.

Expand All @@ -249,15 +249,15 @@ To go back and change your configuration settings, select **1 CONFIGURE**.

### Enable SSO [#enabling]

When testing successfully completes, a link appears that you can use on your company's landing page for easy Single Sign On with New Relic. Unless you've [claimed your domain with New Relic](#domain-allow-list), your users cannot sign in until they [complete the email confirmation](/docs/subscriptions/adding-users-to-saml-accounts) that New Relic sends automatically. After your users select the link in their confirmation email, they can sign in securely with your organization's assigned user name and password. From there they can select any application they are authorized to use, including New Relic.
When testing successfully completes, a link appears that you can use on your company's landing page for easy single sign-on with New Relic. Unless you've [claimed your domain with New Relic](#domain-allow-list), your users cannot sign in until they [complete the email confirmation](/docs/subscriptions/adding-users-to-saml-accounts) that New Relic sends automatically. After your users select the link in their confirmation email, they can sign in securely with your organization's assigned user name and password. From there they can select any application they are authorized to use, including New Relic.

<Callout variant="caution">
If you [disable SAML SSO](/docs/subscriptions/maintaining-sso-settings), New Relic automatically flags all of your **Pending** users as **Active**. If you decide to re-enable SAML SSO later, New Relic automatically flags all users except the Owner as **Pending**, and they will need to confirm their account access by email.
</Callout>

### Add a logout URL for session timeouts [#timeout_url]

New Relic's **Session configuration** feature requires a [logout URL](/docs/subscriptions/setting-session-timeouts#saml_session) for SAML SSO-enabled accounts. If you have already configured, tested, and enabled SAML SSO without a logout URL, New Relic automatically prompts the account Admin to notify the account Owner. In addition, if you are the account Owner, New Relic automatically provides a link from **Session configuration** to go directly to SAML Single Sign On and add a logout URL.
New Relic's **Session configuration** feature requires a [logout URL](/docs/subscriptions/setting-session-timeouts#saml_session) for SAML SSO-enabled accounts. If you have already configured, tested, and enabled SAML SSO without a logout URL, New Relic automatically prompts the account Admin to notify the account Owner. In addition, if you are the account Owner, New Relic automatically provides a link from **Session configuration** to go directly to SAML single sign-on and add a logout URL.

<Callout variant="important">
The logout URL **cannot** contain `newrelic.com` anywhere in the URL.
Expand Down Expand Up @@ -338,7 +338,7 @@ For requirements, including which New Relic users this feature applies to, see [
To update SAML SSO information for users on our [original user model](/docs/accounts/original-accounts-billing/original-product-based-pricing/overview-user-models):

1. Sign in to New Relic by using your SAML SSO login URL.
2. Go to: **[account dropdown](/docs/accounts-partnerships/education/getting-started-new-relic/glossary#account-dropdown) > Account settings > Security and authentication > Single sign on**.
2. Go to: **[account dropdown](/docs/accounts-partnerships/education/getting-started-new-relic/glossary#account-dropdown) > Account settings > Security and authentication > Single sign-on**.
3. To temporarily turn off the SAML integration with New Relic and update your settings, select **Disable SAML login**.
4. Optional: To change your existing SAML certificate, select **Choose file**. Follow standard procedures to select and save the file, then save.
5. Optional: To change your existing SSO URLs, copy and paste in (or type) the **Remote login URL** or **Logout landing URL**, then save.
Expand Down

0 comments on commit f3e163e

Please sign in to comment.