Configuring SAML SSO for multi-tenant AI Hub
Multi-tenant AI Hub customers can use security assertion markup language (SAML)-based authentication to manage AI Hub access. Configuring OIDC-based single sign-on (SSO) allows members to authenticate using your organization’s existing identity provider (IdP) without requiring separate AI Hub passwords. Organization members must be added to your organization before they can sign in using SSO.
AI Hub supports IdPs that use SAML 2.0. You can add multiple SSO configurations for your organization, including both SAML and OpenID Connect (OIDC) configurations. Admins can add and manage SSO configurations.
Configuration overview
Adding an SSO configuration involves both creating an app registration in your IdP with AI Hub-provided details, and adding information from your IdP to the configuration in AI Hub.
IdP configuration requirements
When creating your app registration, there are required values for the service provider entity ID, application label, and assertion consumer service (ACS) URL.
For each required value, the following table provides the names of corresponding fields in select IdPs. The accuracy of the Corresponding IdP field column isn’t guaranteed as external product user interfaces aren’t closely monitored.
Attribute configuration and mapping
Beyond these technical requirements, you can configure your IdP to send user information via attributes to automatically populate member profiles and manage select permissions in AI Hub.
If attributes are passed using the default attribute names listed below, their values automatically populate member profiles. To use custom attribute names, map them to the corresponding attribute during configuration. Attribute values override any existing values in AI Hub.
AI Hub configuration requirements
When adding your SSO configuration in AI Hub, you must provide the IdP metadata XML from your app registration. You can upload the XML file, paste its contents, or provide the remote access value. If uploading or pasting the XML, use the local access value to view or download the XML document.
The following table outlines where you can find the local or remote access value for the metadata XML in select IdPs. The accuracy of this table isn’t guaranteed as external product user interfaces aren’t closely monitored.
Adding SAML configurations
Before you begin
Self-service SSO configuration must be enabled for your organization. Connect with Instabase Support.
-
In the header, click the initials icon and select Settings.
-
Select the Security tab.
-
Click Add configuration > SAML configuration.
-
Copy the provided application label and service provider entity ID values, then click Next. In your IdP, add the values to your app registration.
-
Add a display name to identify the configuration.
-
Select your identity provider.
-
Select a configuration method for how you’re providing the metadata XML.
-
Remote metadata URL — Provide the remote access URL.
-
Metadata XML file — Upload the
.xml
file. -
Metadata XML — Paste the metadata XML directly.
-
-
(Optional) Configure attribute mappings.
-
(Optional) Expand Advanced settings to configure advanced security settings.
-
Response signed — Requires the entire SAML response message to be digitally signed by the identity provider. This provides message integrity protection for the complete response structure containing the assertion. Defaults to not required (not selected).
-
Assertion signed — Requires the SAML assertion within the response to be digitally signed by the identity provider. The SAML 2.0 specification requires IdPs to digitally sign assertions as the minimum security requirement. Defaults to required (selected).
-
Authentication requests signed — Requires authentication requests sent from AI Hub to the identity provider to be digitally signed. This prevents tampering with authentication requests and ensures request integrity. Defaults to not required (not selected).
-
Logout requests signed — Requires SAML logout requests to be digitally signed when users sign out. This ensures the integrity of logout operations between AI Hub and the identity provider. Defaults to required (selected).
-
Allow unsolicited — Allows the identity provider to initiate authentication flows without a prior request from AI Hub. When enabled, users can start the login process directly from the IdP (IdP-initiated SSO) rather than from AI Hub. Defaults to enabled (selected).
-
-
Click Save.
-
Copy the provided ACS URL, then click Close. In your IdP, add the ACS URL to your app registration, and save your changes.
You can now test your configuration.
Testing SAML configurations
Your configuration doesn’t undergo validation, so it must be tested. At minimum test with your own account and optionally engage other organization members to test that they can successfully sign in using SSO.
-
Log out of your AI Hub account.
-
Log back in to AI Hub, and, when presented with sign-in options, click Continue with SSO.
-
Complete sign in with your identity provider.
If you encounter any issues, review all configuration settings.
After successfully testing your configuration, you can optionally turn off the Allow sign-in with email and password toggle to enforce SSO for all organization members.
What's next
Members must be added to your organization before they can sign in using SSO. Members can’t sign up for AI Hub using SSO and access your organization.
Updating SAML configurations
Select configuration changes are supported.
-
In the header, click the initials icon and select Settings.
-
Select the Security tab.
-
In the configurations list, hover over the configuration, then click the edit icon
. -
Make any changes, then click Save
Disabling and deleting SAML configurations
You can disable or delete your configuration. Disabling a configuration removes it as a supported sign-in option, but the configuration is preserved and can later be re-enabled.
-
In the header, click the initials icon and select Settings.
-
Select the Security tab.
-
In the configurations list, hover over the configuration, then click the overflow icon
. -
Select Disable configuration or Delete.
-
Click Disable or Delete to confirm.