- Getting started
- Host administration
- Organizations
- Tenants and services
- Authentication and security
- Licensing
- Accounts and roles
- External applications
- Notifications
- Logging
- Troubleshooting

Automation Suite admin guide
Configuring SSO: SAML 2.0
linkYou can enable SSO using any identity provider that supports the SAML 2.0 authentication protocol.
Overview
linkEnabling SAML SSO is a multi-step process and you must complete the following configuration:
- Configure your identity provider to recognize the UiPath platform as a service provider.
- Configure the UiPath platform as a service provider to recognize and trust your identity provider.
- Provision users to your organization to allow them to log in with SSO using the SAML 2.0 protocol from your identity provider.
Step 1. Configure your identity provider
linkUiPath supports multiple identity providers.
In this section, we exemplify how to find the specific configuration and obtain the certificates for each of the following identity providers:
-
ADFS
-
Google
-
Okta
-
PingOne
A. Configuring ADFS
Configure a machine to support ADFS and make sure you have access to the ADFS Management software. Work with your system administrator if needed.
- Open ADFS Management and define a new relying party trust for Orchestrator as follows:
- Click Relying Party Trusts.
- In the Actions panel, click Add Relying Party Trust. The Add Relying Party Trust Wizard is displayed.
- In the Welcome section, select Claims Aware.
- In the Select Data section, choose the Enter data about relying party manually option.
- In the Specify Display Name section, in the Display name field, insert the URL of the Orchestrator instance.
- The Configure Certificate section does not need any specific settings so leave it as it is.
- In the Configure URL section, select Enable support for the SAML 2.0 Web SSO Protocol.
- In the Relying party SAML 2.0 SSO service URL field, fill in the URL of your Automation Suite instance, plus the suffix
identity_/Saml2/Acs
. For example,https://baseURL/identity_/Saml2/Acs
. - In the Relying party trust identifier field, under the Configure Identifiers section, fill in the URL of your Orchestrator instance, plus the suffix
identity_
. - In the Choose Access Control Policy section, make sure to select the Permit everyone access control policy.
- The Ready to Add Trust and Finish do not need any specific settings, so leave them as they are.
The newly added party trust is displayed on the Relying Party Trusts window.
- Go to Actions > Properties > Endpoints and make sure that POST is selected for Binding and that the Set the trusted URL as default checkbox is selected.
The Endpoint binding needs to be Post. Other bindings such as redirect are not compatible with UiPath as ADFS doesn't sign redirect assertions.
- Go to Actions > Properties > Identifiers and make sure the URL of your Orchestrator instance plus the suffix
identity_
is present.
- Select the relying party trust and click Edit Claim Issuance Policy from the Actions panel.
The Edit Claim Issuance Policy wizard is displayed.
- Click Add rule and create a new rule using the Send LDAP Attributes as Claims template with the following settings:
LDAP Attribute
Outgoing Claim Type
E-Mail-Addresses
E-Mail Address
User-Principal-Name
Name ID
- Once ADFS is configured, open PowerShell as an administrator and run the following commands:
Set-ADFSRelyingPartyTrust -TargetName "DISPLAYNAME" -SamlResponseSignature MessageAndAssertion
ReplaceDISPLAYNAME
with the value set at step 1.e.Restart-Service ADFSSRV
.
B. Configuring Google
- Log in to the Admin console as an administrator, go to Apps and then Web and mobile apps.
- Select Add App and then Add custom SAML app.
- In the App Details page, fill in a name for your Automation Suite instance.
- On the Google Identity Provider details page, copy and save the following for later:
- SSO URL
- Entity ID
- Download the Certificate, open it with a text editor, copy and save the value for the next part of setup in Step 2. Configure Automation Suite.
- In the Service Provider Details page, enter the following:
- ACS URL:
https://{yourDomain}/{organizationName}/identity_
/Saml2/Acs - Entity ID:
https://{yourDomain}/{organizationName}/identity_
- ACS URL:
- In the Attribute Mapping page, provide the following mappings:
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress
Note that this claim is case sensitive.
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/upn
- After configuring the SAML app, go to User access on the Automation Suite SAML app in the Google admin console and select On for everyone.
C. Configuring Okta
- Log in to the Okta Admin Console, go to Applications > Applications, select Create App Integration, and select SAML 2.0 as the Sign-on method.
- In the General Settings page, specify a name for your Automation Suite instance.
- On the Configure SAML page, fill in the General section.
For example:
- Single sign on URL: The Identity base URL +
/Saml2/Acs
. For example,
.https://{yourDomain}/{organizationName}/identity_
/Saml2/Acs - Select the Use this for Recipient URL and Destination URL checkbox.
- Audience URI:
https://{yourDomain}/{organizationName}/identity_
- Name ID Format: EmailAddress
- Application Username: Email
- Single sign on URL: The Identity base URL +
- Fill in the Attribute Statements section:
- In the Name field, type
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress
. Note that this claim is case sensitive. - From the Value list, select user.email.
- In the Name field, type
- In the Feedback section, select the option that suits you.
- Select Finish.
- On the Sign On tab, in the Settings section, select View Setup Instructions.
You are redirected to a new page containing the instructions required to complete the next part of setup in Step 2. Configure Automation Suite:
- Identity Provider Sign-On URL
- Identity Provider Issuer
- X.509 Certificate
- In order for users to be able to use Okta authentication, they must be assigned the newly created application:
- On the Application page, select the newly created application.
- On the Assignments tab, select Assign > Assign to People and then select the users to be given the necessary permissions. The newly added users are displayed on the People tab.
D. Configuring PingOne
-
Add a web application that connects using SAML in PingOne
, with the following specifics:
-
On the Configure SAML Connection page, select Manually Enter and fill out the following:
-
ACS URLS: Case-sensitive URL for your Automation Suite instance +
/identity_/Saml2/Acs
(https://baseURL/identity_/Saml2/Acs
). -
Entity ID:
https://baseURL/identity_
-
SLO binding: HTTP Redirect
-
Assertion Validity Duration: Enter the number of seconds for the validity period.
-
-
On the Map Attributes page, map the following attribute:
Email Address =
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress
-
On the Configure SAML Connection page, select Manually Enter and fill out the following:
- On the Connections > Applications page, find the application you just created and click the icon at the right end of box to show its details.
-
From the Profile tab, copy and save the following values for the next part of setup, described below in
Step 2. Configure Automation Suite
:
-
Client ID
-
Home Page URL.
-
-
If you did not download it during application setup, download the PingOne signing certificate:
- Go to Connections > Certificates & Keypairs.
- Find the application you just created and click at the right end of the box to show its details.
- At the right of the Details tab, click Download Certificate and select the .crt format.
- Open the certificate file in any text editor, copy and save the certificate value for the next part of setup, described below in Step 2. Configure Automation Suite .
Step 2. Configure Automation Suite
linkTo enable Automation Suite as a service provider that recognizes your identity provider:
- Log in to the Automation Suite host portal as a system administrator.
- Go to Security Settings.
- In the External Providers section, click Configure for the appropriate identity provider and follow the applicable instructions to configure SAML:
- To onfigure SAML for ADFS:
-
Select the Enabled checkbox.
-
Select the Force automatic login using this provider checkbox if you want to only allow login with Active Directory accounts.
-
In the Display Name field, type the text you want to show under this login option on the Login page.
-
In the Service Provider Entity ID field, type
https://baseURL/identity_
. -
In the Identity Provider Entity ID field, paste the value obtained while configuring ADFS authentication.
-
In the Single Sign-On Service URL field, paste the value obtained while configuring ADFS authentication.
-
Select the Allow unsolicited authentication response checkbox.
-
In the Return URL field, type
https:/baseURL/identity_/externalidentity/saml2redirectcallback
. -
Set the external user mapping strategy parameter to By user e-mail.
-
For the SAML binding type, select HTTP redirect.
-
In the Signing Certificate field, paste the certificate text.
-
- To configure SAML for Google:
-
Select the Enabled checkbox.
-
Select the Force automatic login using this provider checkbox if you want to only allow login with Active Directory accounts.
-
In the Display Name field, type the text you want to show under this login option on the Login page.
-
In the Service Provider Entity ID field, type
https://baseURL/identity_
. -
In the Identity Provider Entity ID field, paste the Entity ID value obtained while configuring Google authentication.
-
In the Single Sign-On Service URL field, paste the SSO URL value obtained while configuring Google authentication.
-
Select the Allow unsolicited authentication response checkbox.
-
In the Return URL field, type
https://baseURL/identity_/externalidentity/saml2redirectcallback
. -
For External user mapping strategy, select By user e-mail.
-
For SAML binding type, select HTTP redirect.
-
In the Signing Certificate field, paste the Certificate value obtained while configuring Google.
-
- To configure SAML for Okta:
-
Select the Enabled checkbox.
-
Select the Force automatic login using this provider checkbox if you want to only allow login with Active Directory accounts.
-
In the Display Name field, type the text you want to show under this login option on the Login page.
-
In the Service Provider Entity ID field, type
https://baseURL/identity_
. -
In the Identity Provider Entity ID field, paste the Identity Provider Issuer value obtained while configuring Okta.
-
In the Single Sign-On Service URL field, paste the Identity Provider Sign-On URL value obtained while configuring Okta.
-
Select the Allow unsolicited authentication response checkbox.
-
In the Return URL field, type
https://baseURL/identity_/externalidentity/saml2redirectcallback
. -
For SAML binding type, select HTTP redirect.
-
In the Signing Certificate field, paste the X.509 Certificate value obtained while configuring Okta.
-
- To configure SAML for PingOne:
-
Select the Enabled checkbox.
-
Select the Force automatic login using this provider checkbox if you want to only allow login with Active Directory accounts.
-
In the Display Name field, type the text you want to show under this login option on the Login page.
-
In the Service Provider Entity ID field, paste your Automation Suite URL in the format
https://baseURL/identiy_
. -
In the Identity Provider Entity ID field, paste the Issuer ID value obtained while configuring PingOne.
-
Set the Single Sign-On Service URL parameter to the Single SignOn URL value obtained while configuring PingOne.
-
Select the Allow unsolicited authentication response checkbox.
-
In the Return URL field, type
https://baseURL/identity_/externalidentity/saml2redirectcallback
. -
For the External user mapping strategy, select By user e-mail.
-
For the SAML binding type, select HTTP redirect.
-
In the Signing Certificate field, paste the value obtained while configuring PingOne.
-
- To onfigure SAML for ADFS:
- Click Save to save the changes to the external identity provider settings.
- Restart the 'identity-service-api-*' pod. This is required after making any changes to External Providers.
- Connect to the primary server using SSH.
- Run the following command:
kubectl -n uipath rollout restart deployment identity-service-api
Step 3. Optional settings
linkThe following configuration is optional and is only required if you want to use one or both advanced security features.
Step 3.1. Custom Mapping
ADFS, Google, and Okta all use the email address as a SAML attribute. This section handles custom SAML mapping based on either the user name or an external provider key.
The following parameters need to be configured in the SAML 2.0 settings in the External Providers section of the Security Settings page:
-
External user mapping strategy - Defines the mapping strategy. The following options are available:
By user email
- Your email address is set as the attribute. This is the default value.By username
- Your user name is set as the attribute.By external provider key
- An external provider key is set as the attribute.
- External user identifier claim name - Defines the claim to be used as an identifier for the mapping. This is only required if you set your username as the attribute.