SSO/SAML Configuration
Overview
This page describes how to configure SSO (Single Sign-On) and SAML (Security Assertion Markup Language) for Ganymede, depending on your SAML provider.
Okta
Follow these instructions in Okta’s documentation to create a new Okta SAML application.
The following fields should be used in your application:
| Field | Notes | 
|---|---|
| Single sign on URL | https://ganymede-core.firebaseapp.com/__/auth/handler | 
| Audience URI | ganymede.bio | 
Hide this SAML application tile from users - there are instructions below that explain how to create an Okta tile of Ganymede.
Once complete, the following information from your Okta application should be provided to Ganymede:
| Field | Notes | 
|---|---|
| Public Certificate | Must start with "-----BEGIN CERTIFICATE-----", and end with "-----END CERTIFICATE-----". | 
| Identity Provider Issuer (Entity ID) | https://www.okta.com/{unique_key} | 
| Identity Provider Single Sign-On URL (SSO URL) | https://{org}.okta.com/app/{org}_ganymede_1/{unique_key}/sso/saml | 
On the right-side panel of the Okta application window, there is a link to SAML setup. The fields above can be found in that window, and should be shared with Ganymede.
Create Bookmark App
There is a known issue between Okta and Firebase, where the Okta tile will not redirect properly to the Ganymede site. After the SAML application above is configured and working properly, create a new Okta bookmark application that links to your Ganymede tenant.
The png below can be used as the image for the Ganymede tile:
Google
Follow these instructions in Google's documentation to create a new Google SAML application.
The following fields should be used in your application:
| Field | Notes | 
|---|---|
| ACS URL | https://ganymede-core.firebaseapp.com/__/auth/handler | 
| Entity ID | ganymede.bio | 
Once complete, the following information from your Google application should be provided to Ganymede:
- SSO URL
 - Entity ID
 - Certificate
 
Azure
Follow these instructions in Microsoft's documentation to create a new Azure SAML application.
The following fields should be used in your application:
| Field | Notes | 
|---|---|
| Identifier (Entity ID) | ganymede.bio | 
| Reply URL (Assertion consumer service URL) | https://ganymede-core.firebaseapp.com/__/auth/handler | 
| Sign on URL | {client}.ganymede.bio | 
Once complete, the following information from your Azure AD SSO application should be provided to Ganymede:
- Certificate (Base64) - This can be found within the SAML Signing Certificate section
 - Azure AD Identifier - This can be found within the Set up SSO Demo section
 - Login URL - This can be found within the Set up SSO Demo section
 
Shibboleth
Please ensure the following service-provider (SP) metadata is uploaded to IdP:
| Field | Value | 
|---|---|
| Identifier (Entity ID) | ganymede.bio | 
| ACS (Assertion Consumer Service) URL | https://ganymede-core.firebaseapp.com/__/auth/handler | 
Also, please ensure the following metadata format:
| Field | Notes | 
|---|---|
| Name ID | urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress | 
Once complete, the following information should be provided to Ganymede, either directly or through a shared metadata XML page:
- Entity ID - this should be the URL of the metadata XML page if available
 - SSO URL - this should correspond to HTTP-Redirect location metadata
 - Certificate