Table of Contents
If your organization already uses an Identity Provider (IdP) such as Google, Active Directory, Azure AD, ForgeRock, Okta, or Ping Identity, then you can integrate Fugo with these external IdPs by using federation. When federation is set up, users can use Single Sign-On to sign in to their third-party IdP, then access Fugo directly without a second sign-in.
In this article we will show you how you can federate your Fugo account with your Google Idp.
The federation lets employees use their existing organization identity and credentials to sign in to Fugo CMS.
Using SSO can provide several advantages:
You improve user experience by allowing them to use their existing credentials to authenticate, reducing the need for entering credentials frequently.
Allows you to centrally manage your organizational users from your IdP.
Improves security since you don't have to share and synchronize passwords with Fugo
What is SAML
Fugo offers a SAML-based integration with Google SSO that provides partner companies with full control over the authorization and authentication of hosted user accounts that can access web-based applications.
Using the SAML model, Google acts as the service provider
Step 1: Configure Fugo SSO from Google Admin console
To set up SAML-based SSO with a custom application follow the steps below:
Go to your Google Admin console (at admin.google.com)
Go to Apps > Web and mobile apps.
Click Add App Add custom SAML app.
On the App Details page:
Enter the name of the Fugo app: Fugo SAML
(Optional) Add Fugo's app icon.
Click Continue
On the Google Identity Provider details page, enter the following information into your Fugo Account Single Sign On Configuration page (Check step 1 of "Step 2: Configure SSO from your Fugo account")
Copy the SSO Url from the details into the Login Url and Logout Url fields of the Fugo SSO SAML From
Enter the domain name: Domains are used to determine which users are affiliated with your organization when they enter their email address on Fugo's company login screen. Click on th Add domain buton if you want to add multiple domains
Copy the Certificate from the details page into the Fugo Certificate field; make sure to remove the following:
----BEGIN CERTIFICATE---
and----END CERTIFICATE-----
when copy-pasting.Lastly, please confirm that your identity provider is utilizing the RSA_SHA256 signature Aagorithm. If your identity provider is using a different signature algorithm, please contact us at support@fugo.ai
Once done click Continue
Generated Information
You should now see
ACS Url
andEntity Id
appear below SSO on your form. Copy and paste them into your Service Provider to complete the SSO setup.(Optional) Check the Signed Response box if your service provider requires the entire SAML authentication response to be signed. If this is unchecked (the default), only the assertion within the response is signed.
The default Name ID is the primary email:
The default Name ID format as ****
Email
****Name ID as
Basic Information > Email
Once done click Continue
User Provisioning
On the Attribute mapping page, click Add another mapping to map additional attributes.
Under Google Directory attributes, click the Select field menu to choose a field name.
First Name
⇒firstName
Last Name
⇒lastName
fugo_role
=>fugo_role
space_role
=>space_role
Click Finish
Make sure the app is
On
for everyone for your users inService Status
Ensure that the app is enabled for all users by setting
ON for everyone
in theService Status.
Update User customer attributes
Go to Users under Directory in your left pane and choose Manage custom attributes under More Options
Click Add Custom Attribute and fill out the form
Category:
Fugo attributes
Custom Field Name:
fugo_role
3. Click Save to continue
Assigning Fugo Roles & Space Memberships From Your IDP
You can now assign Fugo Roles and Fugo Space memberships when adding users to your account from your IDP. To invite new users, you simply need to make the Fugo app available for them from your IDP. When they sign in for the first time, they will be automatically added to your account with roles and space memberships as specified under the User Provisioning section.
Please note that the fugo_role
attribute now requires a role name that matches the roles in your Fugo account. If the Fugo role name is not found, the new user will be assigned the default role .
Additionally, the fugo_space
attribute requires a space name that matches an existing space in your account. Otherwise, the user will be added to a root space.
The default role is the admin role but it can be set to any other existing role from the Roles section
Step 2: Configure SSO from your Fugo account
An account is already created for you for testing:
Go to your Fugo Account by pressing on the top right corner
Choose the Single-Sign On tab
First Choose SAML 2.0 and name your Identity Provider: this can be anything but it's good to make it recognisable
Then fill out the rest of the form according to Step 6 under Step 1: Configure Fugo SSO from Google Admin console
When done Click
Save Settings
Login using SAML SSO
Logout from your Fugo account
Click
Sign in with Single Sign On
link on the registration pageEnter your email address and click Sign In
You will be asked to authenticate with your Google Idp
If this is your first time using Fugo SSO, you will be asked to link your Idp account with your existing Fugo account :
Click on Add to existing account
And your Fugo Email and Password to confirm you own the Fugo account
When you press Sign In
you will be redirected to your Fugo Account
🤭 This is a one-time-only step. You will not be asked to repeat it next time you use Fugo to Login.
And you’re done! Hopefully, this guide has wrapped up any questions you might have had, but if you are still running into issues after walking through the steps above, please drop our support team an email at support@fugo.ai - we're always happy to help out!