|
Information |
Answer |
|
---|
Tango attributes* |
Okta defaults |
Azure default |
---|---|---|
given_name |
user.firstName |
user.givenname |
family_name |
user.lastName |
user.surname |
|
user.email |
user.mail |
username |
user.login |
user.userprincipalname |
email_verified |
true |
true |
*For other IdPs, refer to your IdP documentation to find out their attribute names.
To set up SSO for your Tango platform, you must first create an entry with your IdP provider and use Tango's configuration values copied from Tango portal.
Log in as an admin to your IdP provider and follow their instructions and create an entry. We have provided some examples below but we recommend you to always check with your IdP documentation for the latest.
Identity provider (IdP) |
OIDC configuration instructions |
SAML configuration instructions |
---|---|---|
Okta IdP | ||
Azure IdP | ||
OneLogin |
Once the SSO entry has been created in your IdP, copy the required values in IdP for Tango portal configuration. After your SSO is enabled, you and your platform users can sign in to Tango using the new SSO.
To configure Tango portal:
Sign in to the Tango portal.
Go to Team settings > Authentication.
Click Add SSO connection.
Select OIDC or SAML and continue as follows:
For OIDC:
Click Continue on the Single Sign-On page to go to the next.
Enter a Connection display name. The connection display name will show up later on the Tango login page as a login method for users.
Enter a custom Client ID that you have configured in IdP. See our SSO configuration steps in IdP guide.
Enter OpenID Connection ID Token Issuer URL. This field is the Tenant ID in IdP. See our SSO configuration steps in IdP guide. The URL link is automatically appended with the following extension as soon as you paste it in the Tango portal: (/.well-known/openid-configuration).
Tango claim keys are automatically populated for standard OIDC. Only if your IdP does not follow the OIDC standard and you see different variables in your IdP, enter those exact variables here to continue.
(Optional) Select Bypass MFA. When you bypass MFA, you won’t be challenged for an MFA when using SSO.
Click Add. The connection is created, but disabled by default. You must test and enable the connection to make it available for your platform users. See how to test and enable SSO connection.
For SAML:
Click Continue on the Single Sign-On page to go to the next.
Enter Connection display name. The connection display name will show up later on the Tango login page as a login method for users.
Enter the Entity ID and Metadata URL that you have configured in your IdP.
(Optional) Click Enter details manually to enter SAML configurations such as Signing certificate, Log in URL, Log out URL, Debug Mode, etc. taken from your IdP.
(Optional) Select Bypass MFA. When you bypass MFA, you won’t be challenged for an MFA when using SSO.
Click Add. The connection is created, but disabled by default. You must test and enable the connection to make it available for your platform users. See how to test and enable SSO connection.
Tango does not require signing certificate. If you get a Sign Request, you must disable it by editing your SAML SSO connection. Here’s how:
To disable Sign Request, follow the procedure below:In Tango portal, navigate to Authentication page and find the SAML connection.
Click the ellipses :Three_dots: menu, and select Edit next to the SAML connection.
Click Enter metadata URL.
Delete the Metadata URL link you have copied from your IdP before.
Click Update.
Click the ellipses :Three_dots: menu next to SAML connection again, and select Edit.
Check to make sure Metadata URL is deleted.
Clear the Sign Request checkbox.
Click Update again. The Sign Request is removed from your connection.
As a Tango portal admin, you should test your SSO connection before enabling it for other users. To test the SSO connection, change it to the testing mode. When the test is successful, enable the connection to make the SSO available for all users on the platform.
To test the SSO connection:
Make sure you are Signed in to the Tango portal with manage authentication permissions.
Go to Team settings > Authentication.
Find OIDC SSO or SAML SSO on the list.
Click ellipsis menu then select Enable testing.
Click Enable testing again to confirm. The label changes on the Tango portal to Testing. You are given a URL to test.
Click ellipsis menu then select Service Provider URL.
Click copy Service provider URL then click Close.
Paste the copied URL in an incognito browser and hit Enter. The UI indicates that the SSO is in Testing mode. You know the test is successful if you can log in to the Tango portal dashboard directly and without entering your password using the Service provider URL link.
Other platform users cannot see this SSO as an option in their login page while the connection is being tested.
To see the new SSO in Tango portal, log off and log back in. The SSO is added to the login methods.
To copy the testing URL anytime after, click Service provider URL from the ellipsis menu next to the SSO. Use the Service provider URL link for Service Provider (SP)-initiated logins (such as Okta) after the test is completed. It will allow your users to skip the Tango login page and directly log in to the Tango application.
You must enable your SSO to make it available for all users in your platform. Enable the authentication after your test confirms the connection is working.
To enable SSO authentication:
Make sure you are Signed in to the Tango portal with manage authentication permissions.
Go to Team settings > Authentication.
Find OIDC SSO or SAML SSO on the list.
Click Enable next to the connection.
Click Enable for all users.
The newly added SSO shows up as a login method in your Authentication and your Tango login page. At this point you and all users can sign in to Tango portal using SSO.
Once the SSO authentication is enabled, you can sign in to Tango portal using the SSO.
If you've logged in using SSO before, you may not see all the steps below.
If you’ve logged in to SSO before you cannot reset your password via Tango portal.
Go to the Tango portal.
Enter your email address and select the Remember email checkbox.
You may need to skip this step if you have logged in to Tango portal before.
Click Continue.
Select Continue with [your] SSO Connection to log in.
If prompted, enter your email address and click Continue. If your IdP prompts you to sign in, enter your credentials to log in to your IdP, and you will be redirected back to Tango. Receive a text message, email, or authenticator app with your six-digit verification code. Enter your six-digit code and click Verify. For more information see Sign in to Tango portal .
This is your first time logging in on this device.
You have not checked the option to remember this device for 30 days last time you logged in.
You have logged in to this device before, but cleared cache/cookies since the last time you used Tango portal.
More resources
Title | Add SSO connection in Tango portal (for admins) |
---|
URL Name | Add-SSO-connection-in-Tango-portal |
---|