Skip to main content

Single Sign-On Configuration

Overview

Jenzabar SONIS Single Sign-On allows users to sign-in through third party applications and stay logged in while maintaining system security. SONIS utilizes SAML protocol to interface with integration service Auth0 and OAuth protocol for single sign-on through Facebook and Google. Additionally, SONIS clients can setup single sign-on through the proprietary protocol used by the Transact refund service and through Microsoft Azure, which utilizes both SAML and oAuth protocols.

In conjunction with Google single sign-on, SONIS provides tools for institutions who use the G Suite line of products, including the ability to provision Google accounts through SONIS. For more about this process, visit the G Suite Integration page.

Note

A third party consultant may be needed for some SSO setup as the setup process outside of Jenzabar SONIS can be challenging.

Web Options

Before using SAML or Auth0 authentication, they must be turned on in Web Options in the Systems hub. Check one of both boxes and click Submit.

SSO_Methods_1.png

SAML

The SAML protocol has been configured and tested with Auth0 but should work with other SAML authenticators. In order for a SONIS user to be authenticated with SAML, they must use either their Primary or Secondary email to access the authentication provider.

Auth0

To use Auth0 for SONIS single sign-on, begin by creating an Auth0 account. This will require an email and password. Auth0 will send an email to validate the account. Follow the link in the email, answer Yes, Coding to the Role question, and click Next.

SSO_Methods_3.png

Once the account is created, select Create Application in the integrate Auth0 into your application section.

SSO_Methods_4.png

Enter a Name for the application, click on the Regular Web Applications box, and click Create.

SSO_Methods_5.png

On the next page, click Skip Integration. The application will display, defaulted to the Settings page.

SSO_Methods_6.png
SSO_Methods_7.png

Navigate to the SSO Configuration page from the SONIS Systems hub. Two options are available: editing the default Auth0 example delivered with SONIS or creating a new configuration. Select the one that meets institutional goals for SONIS management best.

Creating a New Configuration

Click New SAML Configuration.

SSO_Methods_8.png

Enter a title for configuration in the Configuration Name field. This name may be up to 127 alphanumeric characters and will display on the SSO Configuration page.

SSO_Methods_9.png

Enter the name used for the application in Auth0 into the Application Name field.

SSO_Methods_10.png

Copy and paste the Client ID and the Client Secret from the Auth0 Application into the corresponding fields in SONIS.

SSO_Methods_11.png
SSO_Methods_12.png

Click on the Addons tab on the Auth0 application page.

SSO_Methods_13.png

Enable the SAML2 Web App option by clicking on the slider button.

SSO_Methods_14.png

When the slider button is clicked, a page will display with details about the SAML Protocol Configuration. Copy and paste the Identity Provider Login URL value into the Destination URL field in SONIS.

SSO_Methods_15.png
SSO_Methods_16.png

Select the Settings tab in the Auth0 application SAML Protocol Configuration page.

SSO_Methods_17.png

Enter the Application Callback URL which will be the location of the acs.cfm form from SONIS. Scroll to the bottom of the page and click Enable.

SSO_Methods_18.png
SSO_Methods_185.png

Enter the Callback URL in SONIS with the same value entered in Auth0. Check the appropriate checkbox for each portal that should have this SS0 Configuration enabled and click Submit in SONIS.

SSO_Methods_19.png
SSO_Methods_20.png

New SAML Configuration Using Another Authenticator

Institutions that wish to use another SAML authenticator other than Auth0 can do so by configuring Jenzabar SONIS as shown in the following steps. Begin by clicking the New SAML Configuration button at the bottom of the page.

SSO_Configuration_36.png

On the following page, create a Configuration Name and an Application Name. The configuration name is a short name of no more than 16 characters. It will allow you to identify the configuration quickly. The Application Name can be up to 32 characters and is a more descriptive label.

SSO_Configuration_37.png
SSO_Configuration_38.png

The Client ID and Client Secret will both be provided by the SAML identity provider. These are masked when entered and encrypted in the database.

SSO_Configuration_39.png
SSO_Configuration_40.png

The Destination URL will be listed in the setup with the identity provider as well.

SSO_Configuration_41.png

The Callback URL is the page where the user logging in should return after being directed to the SSO provider. The field should automatically populated and should be left as filled if SONIS will handle the redirect. If students should be sent to another site, replace the pre-filled value with the correct URL.

SSO_Configuration_42.png

Choose which portal or portals should have the SAML login active and check the corresponding box or boxes.

SSO_Configuration_43.png

To upload a logo for the connection that will appear on the SONIS sign-in page, click the Browse button, locate the file on the local computer, and either double-click it or click it once to select it and click Open.

SSO_Configuration_44.png
SSO_Configuration_45.png

Click Submit to save the changes. The SAML login will be active within Jenzabar SONIS.

SSO_Configuration_46.png
Setup Within Provider Application

Each SAML or SSO provider has different set up requirements, but most will need a similar type of information. The details provided here may be used to configure the provider connection within the provider's system or application.

* SAML Subject NameID Format: Ideally, this would be a nmeid-format:emailAddress. If this is not possible, Jenzabar SONIS has been coded to expect an email address in other areas of the response.

* Redirect Endpoint: The Jenzabar SONIS redirect is the acs_saml.cfm with the relaystate returned to SONIS from the SSO provider. A form field called relaystate is included in the request and the relaystate needs to be returned as a form variable called relaystate.

* Signature Algorithm: No specific signature algorithm is required.

OAuth

The OAuth protocol is used by both Facebook and Google. In both cases, the first step is to acquire a free developer account. Create a Login API in the Facebook and/or Google system. Once the application has been created, Facebook and Google will provide the values that are needed for SONIS configuration.

Facebook

To set up Facebook single sign-on, click the Facebook link in the Configuration Name column.

SSO_Configuration_12.png

The Configuration Name is locked in and can not be changed. The Application Name field is automatically populated as well, but can be edited to suit individual needs.

SSO_Configuration_13.png

The Client ID and Client Secret values are provided by Facebook under the Basic Settings tab as the App ID and App Secret. Copy and past them into the corresponding SONIS fields.

SSO_Configuration_14.png
SSO_Configuration_15.png

The API Key field is unused at this time and can remain blank. The Destination URL is Facebook's published destination URL for OAuth2 at the time of this release. It should not be changed unless this value changes in the future. The Callback URL is automatically filled in based on the institution's system setup and should also be left unchanged unless the institution needs to direct the users to a different page for some reason.

SSO_Configuration_16.png
SSO_Configuration_17.png

Choose which portal or portals should have the Facebook login active and check the corresponding box or boxes.

SSO_Configuration_18.png

SONIS provides a Facebook icon, but it can be changed to suit user preferences. Click the Browse button, locate the file on the local computer, and either double-click it or click it once to select it and click Open.

SSO_Configuration_19.png

Click the Submit button to save the changes. Facebook login will be active on all selected portals. Users should click the Facebook logo and log into their personal Facebook account. Once the user is logged in to Facebook, they will stay logged in to SONIS as long as their browser window is open.

SSO_Configuration_34.png
SSO_Configuration_20.png
SSO_Configuration_35.png

Google

To set up Google single sign-on, click the first Google link in the Configuration Name column.

SSO_Configuration_21.png

The Configuration Name is locked in and can not be changed. The Application Name field is automatically populated as well, but can be edited to suit individual needs.

SSO_Configuration_22.png

The Client ID and Client Secret values are provided by Google under the Basic Settings tab as the App ID and App Secret. Copy and past them into the corresponding SONIS fields.

SSO_Configuration_23.png
SSO_Configuration_24.png

The API Key comes from Google. It's located under the Credentials tab.

SSO_Configuration_25.png

The Destination URL is Google's published destination URL for OAuth2 at the time of this release. It should not be changed unless this value changes in the future. The Callback URL is automatically filled in based on the institution's system setup and should also be left unchanged unless the institution needs to direct the users to a different page for some reason.

SSO_Configuration_26.png
SSO_Configuration_27.png

Choose which portal or portals should have the Google login active and check the corresponding box or boxes.

SSO_Configuration_28.png

SONIS provides a Google icon, but it can be changed to suit user preferences. Click the Browse button, locate the file on the local computer, and either double-click it or click it once to select it and click Open.

SSO_Configuration_29.png
SSO_Configuration_30.png

Click the Submit button to save the changes. Google login will be active on all selected portals. Users should click the Google logo and log into their personal Facebook account. Once the user is logged in to Google, they will stay logged in to SONIS as long as their browser window is open.

SSO_Configuration_31.png
SSO_Configuration_32.png
SSO_Configuration_33.png

Transact

To set up Transact single sign-on, click Transact under the Configuration Name column. Note that Transact was formerly known as CashNet.

CashNet_13.png

On the following page, the Application field is filled in as My Transact Payments by default, but this can be changed to suit individual preferences. This name is used internally only as a means to identify the configuration.

CashNet_14.png

The Client ID is the school's Transact username. The Shared Key is provided by Transact as well. Both fields are protected to keep these values from being acquired by unauthorized users.

CashNet_15.png
CashNet_16.png

The Timeout field controls how long the SONIS system will attempt to connect to Transact during a login attempt before halting and displaying an error message. The value is in seconds and can be changed to suit administrator preference.

CashNet_17.png

The User ID field tells Transact which user identification attribute will be used. Based on the current Transact, the value should always be eusername.

CashNet_18.png

The Destination URL tells the SONIS system where to send the login information. This value must be https://www.transactcampus.com/ for the single sign-on to function as long as the current configuration is in place.

CashNet_19.png

To change the Transact logo being used internally by SONIS, click the Browse button and select a new icon.

CashNet_20.png

Once the configuration has been completed, click Submit to save the changes and activate the ability for students to log in to Transact.

CashNet_21.png

Once the Transact single sign-on has been set up, students can log in through their portal page. Simply, click on Transact under the Financial tab. The Transact logo will appear. Clicking on the Transact logo will open the Transact interface in a new window.

CashNet_22.png

Microsoft Azure

Jenzabar SONIS uses both SAML and oAuth to pass information back and forth with Microsoft. SAML is used for authentication, passing credentials for the logged-in user to Microsoft via an XML formatted AuthN request. oAuth is used to provide SONIS with additional information about the user—the user's Microsoft login name and their profile photo. The second is only needed for the Azure Active Directory Sync.

For more information on the Microsoft side of the setup process, visit the Azure Integration page.

SAML

To use the seamless single sign-on feature, begin by clicking the Microsoft link for the Azure AD Authentication application with the SAML protocol.

Azure_2.png

On the following page, three of the fields are prepopulated, including the Application field. By default, the application is called Azure AD Authentication, but this can be changed to suit client preferences.

Azure_3.png

To locate the correct Client ID, log in to Azure, and navigate to the SONIS Enterprise Application. Click Copy to clipboard next to the Application ID field and paste the data into the Client ID field in SONIS.

Azure_4.png
Azure_5.png

The Client Secret field is not used at this time.

The Destination URL is another prepopulated field. To locate the Tenant ID, navigate away from the application-specific data to the the Overview page in Azure AD. Replace the section labeled {tenantid} with the school's actual tenant ID.

Azure_6.png
Azure_7.png

The Callback URL is prepopulated as well. This can be changed to another address if the school has created a custom URL to redirect students. If SONIS is handling the response from Microsoft, then the field must be left as-is.

Azure_8.png

Choose a portal or portals to enable and check the corresponding boxes.

Azure_9.png

To change the logo that will be displayed to users, click the Browse button and select the file on the local machine.

Azure_10.png
Azure_11.png

Click Submit to save the page and activate seamless single sign-on.

Azure_12.png

oAuth2

Again, if Azure is only being used for seamless single sign-on, SAML is the only protocol that needs to be activated. However, if the school is using Azure Active Directory Sync, the oAuth2 protocol must be activated as well. Click on the Microsoft link for the Graph API application.

Azure_13.png

As with the SAML configuration page, multiple fields are prepopulated. The Application is named Graph API by default, but this name can be changed.

Azure_48.png

To locate the correct Client ID, log in to Azure, and navigate to the SONIS Enterprise Application. Click Copy to clipboard next to the Application ID field and paste the data into the Client ID field in SONIS.

Azure_4.png
Azure_49.png

The Client Secret and API Key fields are not used at this time.

Replace the {tenantid} in both the Authorization URL and the Token URL with the school's actual tenant ID. The Tenant ID is located on the Overview page in Azure AD.

Azure_6.png
Azure_50.png
Azure_51.png

The Profile URL and Photo URL fields should be left as-is, including the {user} text, which is used by the SONIS system and does not need to be replaced.

The Callback URL is prepopulated as well. The URL should be http://[domain]/ms_acs.cfm with the [domain] or sonis.edu text replaced by the local domain. The value can be replaced by another address if the school has created a custom URL to redirect students. If SONIS is handling the response from Microsoft, then the field must be left in this format.

Azure_52.png

If the Retrieve Azure SAM Name box is checked, SONIS will retrieve the user’s local on-premises account name and store it in the AD User Name field, which can be accessed from the Biographic page. This box must be checked for the synchronization to function properly.

Azure_53.png

If the Retrieve Azure Profile Photo box is checked, SONIS will retrieve the user's thumbnail photo from the jpegPhoto attribute in Active Directory. For this feature to work, the school must select the jpegPhoto attribute for synchronization with Azure AD through the custom attribute selection. SONIS will also attempt to collect the photo used by the Office 365 profile if the jpegPhoto is not present. Note that this feature can slow down the synchronization process considerably and is not recommended in most cases.

Azure_54.png

Click Submit to save the setup.

Azure_55.png