Overview
SAML-based single sign-on (SSO) allows user access to interopiO® through an identity provider (IDP) of your choice. You will need to configure both your identity provider and configure your interopiO Account to enable SSO for your account.
interopiO provides a step-by-step guide for the following identity providers:
- Okta
- JumpCloud
Identity Providers
Okta IDP
Configure the Okta SSO Application
-
Navigate to the Admin Console in your Okta organization by clicking Admin in the upper-right corner.
-
In the Admin Console, go to Applications > Applications.
-
Click Add Application.
-
Click Create New App to start the Application Integration Wizard.
-
Select Web as the platform for your integration. Web is the only supported platform for SAML 2.0 applications in the OIN.
-
Select SAML 2.0 in the Sign on method section.
-
Click Create.
-
On the General Settings tab, enter a name for your integration and optionally upload a logo.
-
In the Single sign on URL field, enter https://ACCOUNT.interopio.com/account-api-2/login-sso (replace ACCOUNT with your unique account's registered path).
-
In the Audience URI enter https://ACCOUNT.interopio.com (replace ACCOUNT with your unique account's registered path).
-
Choose EmailAddress and Email for the Name ID format and Application username that must be sent to your application in the SAML response.
-
For user attributes add the following attributes and point them to the corresponding Okta user values:
-
email
-
firstName
-
lastName
-
-
Click Next.

14. On the next step select I'm an Okta customer adding an internal app.
15. Click Finish.
Okta Settings for interopiO
-
Select your app in Okta Admin console.
-
Go to the Sign On tab.
-
In the Settings menu click the View Setup Instructions button.
-
Leave the new page open and navigate to interopiO console.
Configure interopiO Account
-
Log in to interopiO as an administrator
-
Navigate to the USERS & PERMISSIONS tab
-
Expand the Authentication Configuration Card
-
Press the Enable SSO Toggle
-
In the SAML 2.0 Endpoint (HTTP) field, enter the Identity Provider Single Sign-On URL value on your Okta Setup Instructions page.
-
In the Identity Provider Issuer field, enter the Identity Provider Issuer value on your Okta Setup Instructions page
-
In the Public Certificate text field, paste the X.509 Certificate value on your Okta Setup Instructions page
-
Click Save Auth Config.
JumpCloud IDP
Configure the JumpCloud SSO Application
-
Access the JumpCloud Administrator Console at https://console.jumpcloud.com.
-
Go to User Authentication > SSO.
-
Select the + in the upper left, select Custom SAML App at the bottom
-
In the IDP Entity ID field, enter https://YOURDOMAIN.TLD (e.g., https://example.com).
-
In the SP Entity ID field, enter https://ACCOUNT.interopio.com (replace ACCOUNT with your unique account's registered path).
-
In the ACS URL field, enter https://ACCOUNT.interopio.com/account-api-2/login-sso (replace ACCOUNT with your unique account's registered path).
-
Check the Sign Assertion checkbox
-
In the Login URL field, enter https://ACCOUNT.interopio.com/account-api-2/login-sso (replace ACCOUNT with your unique account's registered path).
-
In the field terminating the IdP URL, either leave the default value or enter a plaintext string unique to this connector.
-
In the USER ATTRIBUTE MAPPING menu add the following attributes:
-
email
-
firstName
-
lastName
-

11. Select Activate.
Configure MFA on the JumpCloud SSO Application
Note: MFA is strongly recommended for interopiO Accounts containing PHI-enabled environments.
-
Go to the user groups of the specific application
-
Pick a user from that list and enable “Require Multi-factor Authentication on the User Portal” in the details section and then save.
-
Next time the user logs into the Jumpcloud User portal, they will be required to enter an MFA
-
Alternatively if the user tries logging into the admin console (the specific ones set up for MFA), and they are not logged into the JumpCloud User portal, they will be redirected to the portal and asked to enter their MFA and then be redirected to the admin console.
Configure interopiO Account for SSO
-
Log in to interopiO as an administrator
-
Navigate to the USERS & PERMISSIONS tab
-
Expand the Authentication Configuration Card
-
Press the Enable SSO Toggle
-
In the SAML 2.0 Endpoint (HTTP) field, enter the same IdP URL that you set in the JumpCloud console (if you did not modify the termination of this URL, then enter the default URL: https://sso.jumpcloud.com/saml2/saml2).
-
In the Identity Provider Issuer field, enter https://YOURDOMAIN.com (this should be the same value you entered while configuring JumpCloud).
-
In the Public Certificate textfield, paste the contents of your public certificate.
-
Click Save Auth Config.
Comments
Please sign in to leave a comment.