Note: Please get acquainted with this instruction to successfully set up SAML for Docupace. Proceed on the next steps if you have all the preferred professional services mentioned below. Otherwise, request professional services to create CR for the aspects of this configuration that are custom to your specific requirements.
To set up Security Assertion Markup Language (SAML), stick to the following process:
Rw ui steps macro |
---|
The Client provides Docupace with name of Identity Provider (IDP) for setting it up. Docupace Professional Services (or Support) creates a ticket with: Ticket Type: “Task.” Ticket Description: “Configure SAML for X site.” For more information, view the JIRA Workflow for this ticket type.
| Jira workflow |
Docupace sets up the site for SAML and then sends the URL to the SAML site, where customer can download the Service Provider (SP) Metadata. Customer provides: Identify Provider (IDP) Metadata. Test user for the SSO testing.
Docupace SRE configures the SAML site with the Identity Provider (IDP) Metadata. Docupace Business Analyst creates a test user provided by the Customer that matches the username in IDP. Docupace informs the Customer when the SAML setup is completed and then provides the URL for Service Provider (SP) initiated by Identity Provider (IDP). Customer tests the SAML integration using Service Provider URL provided by Docupace. Testing of SAML integration confirms that the configuration at both ends has been completed successfully for both Service Provider and Identity Provider initiated by SSO. |
Info |
---|
Important: If the test fails after accomplishing all the preferred actions, schedule a meeting between Docupace and the Customer's Identity Prover’s experts. During that meeting, the Customer’s experts and Docupace SAML experts will test the integration in the real-time environment, which can troubleshoot the SAML configuration. As a result, experts will determine whether they need to involve professional services. |