Create a SAML Authentication Server to authenticate users using OneLogin.
In the AMC, navigate to System Configuration > Authentication Servers.
Under Authentication servers, click the + (New) icon. The Add Authentication Server page displays.
Select SAML 2.0 Identity Provider.
Click Continue The Edit Authentication Server page displays.
The steps that follow explain how to configure the fields in the Configure Authentication Server .
In the Name field, enter OneLogin.
https://workplace.company.com.Select the Endpoint FQDN value. For example, workplace.company.com.
Under the Identity Enter Configuration section, click the Choose file or Browse button to upload the OneLogin SAML IdP metadata XML file downloaded from the OneLogin admin portal.
Click Import to import the OneLogin configuration.
If the user should not be logged out from the OneLogin portal when logging out of SMA1000 Connect Tunnel or Workplace, clear the Logout service URL field value.
Expand the Advanced section.
For group level management, if you are sending user groups or roles information from OneLogin to SMA1000 (in case of no on-prem AD), set the SAML claim containing the user groups field with the value as the field name you configured when creating the application on the OneLogin admin portal.
Example 1: groups
Example 2: roles
For group level management, if the user directory (Active Directory, etc) is available on-premises, configure it as an authentication server. Next, use the "Group Authorisation" option on the Realm page to leverage AD for resource authorisation, while using OneLogin for user authentication. Refer to the following sections
Click Save.