SignRequest SAML application setup
Introduction
This article demonstrates how to set up HelloID and SignRequest for single sign-on using the SAML protocol. The configuration takes place in HelloID and requires you to send information to SignRequest.
Requirements
HelloID environment
SignRequest environment
Create or import a certificate
If there is no certificate yet, a certificate must be imported or created. For this tutorial, we will use a self-signed certificate. Create one before proceeding and name it SignRequestSelfSigned
.
Application setup
Add the SignRequest application
Go to Applications > Applications and select the Open application catalog button. Find the template for SignRequest (SAML) and select its Add button. Learn more about managing applications here.
General tab
On the General tab, replace the Default Login URL with your SignRequest ACS login URL. This is in the format https://signrequest.com/user/social/login/saml/?next=%2F&idp={customer}
.
Select the Next button.
Single Sign-on tab
On the Single Sign-On tab, perform the following steps:
Name ID format
username
Issuer
Your HelloID portal URL, e.g.,
https://enyoi.helloid.com
Endpoint/ACS URL
Your SignRequest endpoint URL, e.g.,
https://signrequest.com/user/social/complete/saml/
ACS validation list
Your SignRequest endpoint URL, e.g.,
https://signrequest.com/user/social/complete/saml/
BindingHTTP-POST
RelayState
The RelayState value which you received from SignRequest
Sign Response
On
X509 Certificate
SignRequestSelfSigned
Overwrite Audience
On
Extra Audience
Your SignRequest metadata URL, e.g.
https://signrequest.com/user/auth/saml/metadata/{customer}/
Select the Next button.
Self service tab
On the Self Service tab, choose whether to generate a Self Service product, which makes the application requestable. Optionally, choose a group to control access to the application.
Select the Next button.
Finish tab
On the Finish tab, select the Save button to add the SignRequest application to HelloID.
Supplier-side configuration
The HelloID side of the configuration is now finished, but SignRequest needs to add the connection on their side.
Note that they will need the Metadata URL. To retrieve this value, go to Applications > Applications. Locate your newly-added SignRequest application and select its Edit link. Right-click the Download metadata button and select Copy link address. This will be in the format https://{customer}.helloid.com/metadata/download?ApplicationGUID={guid}
Send this value to SignRequest and request that they complete the connection.
Finish up
The SignRequest application has been added to HelloID, and a trust has been configured between SignRequest and HelloID. You are now free to assign the application to users within your organization and begin testing it and using it. See Applications - Overview and its related articles for more information.