SAML SSO for Solve

When accessing Solve via a direct URL, you can configure SAML to enable Single Sign-On (SSO) authentication. The settings in Solve enable you to set up a trust relationship between the URL hosting Solve and your company's Identity Provider (IdP) so users can access Solve securely.

Here is an overview of what you have to do to configure SAML with detailed steps provided below.

  • Enter the required URLs from your IdP into the Solve settings page.
  • Upload a trusted certificate from your IdP into the Solve settings page.
  • Download the trusted certificate from the Solve page and add it into your IdP.
  • Retrieve the necessary fields from the Solve settings page and enter them into your IdP.

Below are the specific steps you have to perform regardless of which IdP you use. Following this procedure, we have provided two use cases to demonstrate how to configure SAML/SSO in Solve for two specific Identity Providers:

To configure SAML in the Solve interface:

    1. In your chosen IdP, locate the trust certificate to use for Solve and copy it to a location accessible to the local computer from where you are accessing Solve.
    2. Open the ControlUp Real-Time Console.
    3. Access Solve from the Solve menu on the top ribbon of the console. The Solve interface opens in a browser window.


    1. On the Solve home page, click the settings button SettingsButtonSolve.pngat the bottom of the menu on the left side of the window.
    2. In the Solve Settings page, turn the toggle button on for Enable SAML (SSO) Authentication.

      Note: It is recommended not to enable both SAML and LDAP. If both are enabled, Solve uses SAML authentication.

    3. Enter the following URLs from your IdP: 

- IdP Login URL. The URL used for logging into your IdP.
- IdP Logout URL. This is an optional field to use for signing out of the IdP. For example, if ADFS is the IdP, the URLs could look like this with your company's domain:

    1. Click IdP Signing Certificate and locate the certificate from your IdP that you copied in Step 1.
    2. Enter the Entity/Issuer ID. The virtual server as configured in the IdP connection certificate.
      For example, the URL could look like this with your company's domain:


    1. The Solve settings page provides you with the following values: 

- Relying Party Trust Identifier. The uniform resource name that is a unique, persistent identifier.
- Endpoint/Assertion Login URL. The endpoint that your IdP will use to redirect during the authentication process.
- Assertion Logout URL
Here's an example of what these values could look like:
Copy these values and enter them into the appropriate locations in your IdP.

    1. Under Solve Signing Certificate, click the certificate link to download the trust certificate for Solve and save it in a location that your IdP can access. 

Now you can return to your chosen IdP and create an endpoint for Solve using the values provided and the downloaded certificate. 

Use Case Example - Active Directory Federation Service (ADFS)

Read here to get the basic details of how to configure secure SAML authentication if your Identity Provider (IdP) is ADFS. 

  1. Open your ADFS interface.
  1. Under the Service folder, click Certificates. Copy one of the certificates to a location accessible to the user configuring the SAML settings for Solve. 

This is step 1 from the generic steps above, and you upload this certificate in step 7 above.

  1. In the ADFS interface, select Relying Party Trusts. Right-click to open the Properties dialog.

ADFS_RelyingPartyTrustsMenuBlank.png ADFS Properties Dialog

  1. In the Properties dialog, select the Endpoints tab and click Add SAML... The Edit Endpoint dialog opens.
  1. Under the Trusted URL field, copy the Assertion URL you retrieved from the Solve Settings page in step 9 of the procedure above.


ADFS Edit Endpoint Dialog

Ensure that:
Endpoint type is SAML Assertion Consumer
Binding is POST

  1. Click OK and this Endpoint is added.


ADFS - Endpoint Added

  1. In the same Properties dialog, select the Signature tab, click Add and upload the Solve certificate you downloaded in step 10 of the procedure above.


ADFS - Add Signature

  1. In the same Properties dialog, select the Identifiers tab, and under the Relying party identifier: field, enter the Relying Party Trust Identifier value you retrieved from the Solve Settings page in step 9 of the above procedure. Click Add next to the field and you'll see the URN added to the list of Relying party identifiers in the dialog.


ADFS Identifiers

Your Solve users should now be able to authenticate through your ADFS identity provider.

Use Case Example - Azure Active Directory SAML


  • Must have an Azure Enterprise account.
  • Azure Active Directory (AD) must be configured.
  • Must have the necessary permissions to create the application.
  • We assert the UPN and must match what Azure presents so we require the NameID attribute with the UPN value of the user. For example:

<NameID Format="urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress">The user Marcel created</NameID>

Preparation on Azure AD

  1. In the Browse Azure AD Gallery, select Create your own application

Create an Enterprise Application Image Azure AD - App Creation Screenshot

  1. In the Create your own application page, enter a name of your choosing and select Integrate any other application you don't find in the gallery.
  1. Click Create.
  1. Review the app you’ve just created.

Screen_Shot_2021-06-30_at_9.11.40_AM.png Azure AD - All Applications Menu


Assignment Option

Assign Users and Groups In the properties Management tab, set User Assignment required? to NO.
Assign Users and Groups Set User Assignment Required to NO


Side-by-side with comments  (Azure console and Solve settings)

Here is a side-by-side comparison of the values from Azure AD that must be entered into the Solve SAML settings and vice versa. The arrows indicate from where you can obtain the applicable string and to where it goes in the other application.

Azure AD Console                                                                                                     Solve SAML Settings



1-on-1 Demo
Schedule now
Price Quote
Get it now
Need a Script?
Get it here
Powered by Zendesk