OneLogin SSO Integration
CLOUDOverview
This guide provides step-by-step instructions for setting up Single Sign-On (SSO) between Dragonfly Cloud and OneLogin using SAML 2.0. Once configured, your users can sign in to Dragonfly Cloud using their OneLogin credentials.
Prerequisites
Before starting:
- OneLogin Administrator Access: You need administrator permissions in your OneLogin account
- Verified Domain: Your email domain must be verified in Dragonfly Cloud. See Domain Verification
- Dragonfly Cloud Owner Role: You need Owner permissions in Dragonfly Cloud to configure SSO
Configuration Overview
The setup process involves:
- Create SSO Connection with IdP in Dragonfly Cloud: Set up the connection and obtain SAML configuration details
- Configure OneLogin Application: Create and configure a SAML app in OneLogin
Step 1: Create SSO Connection in Dragonfly Cloud
Navigate to Access > SSO in Dragonfly Cloud
Click Add Connection to create a new SSO connection
Enter the connection details:
- Name: Give your connection a descriptive name (e.g., "OneLogin SSO")
- Provider Type: Select SAML: Custom (OneLogin uses standard SAML v2)
- Domains: Select your verified domain(s)
Keep this page open as you'll need to return to complete the configuration after setting up OneLogin.
Step 2: Create SAML Application in OneLogin
Create a New Application
- Sign in to your OneLogin Admin Portal at
https://your-domain.onelogin.com/admin - Navigate to Applications > Applications
- Click Add App
- Search for "SAML Custom Connector (Advanced)" and select it
- Click Save
Configure Application Details
- Display Name: Enter "Dragonfly Cloud" (or your preferred name)
- Description (optional): Add a description for the application
- Visible in portal: Check this box if you want users to see the app in their OneLogin portal
- Icons (optional): Upload custom icons for the application
- Click Save
Step 3: Configure SAML Settings in OneLogin
Navigate to the Configuration tab:
Application Details
Audience (EntityID): Enter the Entity ID provided by Dragonfly Cloud
- Example:
XXXXXXXXXXXor the specific SP Entity ID from Dragonfly
- Example:
Recipient: Enter the ACS URL provided by Dragonfly Cloud
- Example:
https://dragonflydb.cloud/auth/saml/callback
- Example:
ACS (Consumer) URL Validator: Enter a regular expression to validate the ACS URL
- Example:
https://dragonflydb\.cloud/.* - Or leave as default:
.*
- Example:
ACS (Consumer) URL: Enter the same ACS URL as Recipient
- Example:
https://dragonflydb.cloud/auth/saml/callback
- Example:
SAML initiator: Select Service Provider (SP-initiated login)
SAML nameID format: Select Email
SAML signature element: Select Assertion (or Both for enhanced security)
Click Save
Step 4: Configure Parameters (Attributes)
Navigate to the Parameters tab to configure user attribute mappings:
Add Custom Parameters
Click the + button to add new parameters for each required attribute:
Email Attribute
- Click + to add a parameter
- Field name:
email - Check Include in SAML assertion
- Click Save
- In the parameter list, click on
email - Value: Select Email from the dropdown
- Click Save
First Name Attribute
- Click + to add a parameter
- Field name:
firstName - Check Include in SAML assertion
- Click Save
- In the parameter list, click on
firstName - Value: Select First Name from the dropdown
- Click Save
Last Name Attribute
- Click + to add a parameter
- Field name:
lastName - Check Include in SAML assertion
- Click Save
- In the parameter list, click on
lastName - Value: Select Last Name from the dropdown
- Click Save
Step 5: Get OneLogin SAML Metadata
Navigate to the SSO tab to obtain SAML metadata:
Option A: Using Metadata URL (Recommended)
- Scroll to the Issuer URL section
- Copy the Issuer URL (this is your metadata URL)
- Example:
https://app.onelogin.com/saml/metadata/your-app-id
- Example:
Option B: Manual Configuration
If you prefer manual configuration:
- Issuer URL: Copy this value (this is the Entity ID)
- SAML 2.0 Endpoint (HTTP): Copy this value (this is the SSO URL)
- X.509 Certificate: Click View Details next to the certificate
- Copy the certificate content (including BEGIN and END lines)
Step 6: Complete Dragonfly Cloud Configuration
Return to the Dragonfly Cloud SSO connection configuration:
Option A: Using Metadata URL (Recommended)
- Paste the OneLogin metadata URL into the Metadata URL field
- Dragonfly Cloud will automatically fetch and populate:
- Entity ID
- SSO URL
- Certificate
Option B: Manual Configuration
Enter the values you copied from OneLogin:
- Entity ID: Issuer URL from OneLogin
- SSO URL: SAML 2.0 Endpoint (HTTP) from OneLogin
- Certificate: X.509 Certificate from OneLogin
Click Create Connection
Step 7: Assign Users in OneLogin
Before users can sign in, they must be assigned to the application:
- In the OneLogin Admin Portal, go to the Dragonfly Cloud application
- Navigate to the Users tab
- Click Add Users or Add to application
- Select individual users or click Select all
- Click Continue and then Save
Alternatively, assign by roles:
- Navigate to Users > Roles in OneLogin
- Select or create a role
- Go to the Applications tab
- Add the Dragonfly Cloud application to the role
- All users in that role will have access
Step 8: Enable the Connection
Back in Dragonfly Cloud:
- Go to Access > SSO
- Find your OneLogin SSO connection
- Toggle the connection to Enabled
Step 9: Test the Connection
Test that SSO is working correctly:
- Open a private/incognito browser window
- Navigate to Dragonfly Cloud
- Enter your work email address (from your verified domain)
- You should be redirected to OneLogin for authentication
- After signing in with your OneLogin credentials, you should be redirected back to Dragonfly Cloud
Test with a single user first before rolling out to your entire organization.
SCIM Provisioning
SCIM (System for Cross-domain Identity Management) allows OneLogin to automatically create, update, and deactivate user accounts in Dragonfly Cloud.
Enabling SCIM in Dragonfly Cloud
- Navigate to your SSO connection in Dragonfly Cloud
- Toggle SCIM Provisioning to enabled
- Copy the SCIM Endpoint URL and Bearer Token (you'll need these for OneLogin configuration)
Configuring SCIM in OneLogin
- In the OneLogin Admin Portal, go to your Dragonfly Cloud application
- Navigate to the Provisioning tab
- Enable Provisioning by toggling it on
- SCIM Base URL: Paste the SCIM endpoint URL from Dragonfly Cloud
- Example:
https://api.dragonflydb.cloud/scim/v2
- Example:
- SCIM Bearer Token: Paste the bearer token from Dragonfly Cloud
- API Connection: Click Enable and then Verify to test the connection
Enable Provisioning Features
Configure the provisioning workflow:
Still in the Provisioning tab, configure the following:
- Workflow: Enable the provisioning workflow
- Create user: Check this box to create users in Dragonfly Cloud when assigned in OneLogin
- Delete user: Check this box to deactivate users in Dragonfly Cloud when unassigned
- Update user: Check this box to sync user profile changes
Require Admin Approval: Optionally enable if you want to manually approve provisioning actions
Click Save
Testing SCIM Provisioning
Test that SCIM provisioning is working:
- Assign a test user to the Dragonfly Cloud application in OneLogin
- Check the Users tab in the application for provisioning status
- Verify the user appears in Dragonfly Cloud under Access > Users
- Unassign the test user and verify they are deactivated in Dragonfly Cloud
- Check the Activities or Events log in OneLogin for provisioning events
Troubleshooting
Common Issues
"User not found" when signing in
- Ensure the user is assigned to the Dragonfly Cloud application in OneLogin
- If SCIM is enabled, wait a few minutes for provisioning to complete
- Check OneLogin's Events log for authentication errors
"Invalid SAML Response"
- Verify the SAML parameters (email, firstName, lastName) are correctly configured in OneLogin
- Ensure the Name ID format is set to Email
- Check that the certificate has not expired
"OneLogin metadata URL not accessible"
- Ensure the Issuer URL is correct
- Try using manual configuration instead of metadata URL
- Verify the application is enabled in OneLogin
SCIM provisioning not working
- Verify the SCIM endpoint URL and bearer token are correct
- Ensure the SCIM connection is verified (green status) in OneLogin
- Check that provisioning features (Create, Update, Delete) are enabled
- Review OneLogin's Events or Provisioning logs for error messages
- Ensure required parameters (email, firstName, lastName) are configured
"Certificate validation failed"
- Verify you copied the complete certificate (including
-----BEGIN CERTIFICATE-----and-----END CERTIFICATE-----lines) - Ensure the certificate is not expired (check in OneLogin under SSO tab)
- Try refreshing the metadata URL to get the latest certificate
OneLogin Logs
Check OneLogin's logs for detailed error information:
- Events: Navigate to Activity > Events in OneLogin Admin Portal
- Filter by application: Filter events to show only Dragonfly Cloud application events
- Provisioning Logs: Check the Provisioning tab in the application for SCIM operation logs
Certificate Rotation
OneLogin certificates expire periodically. To rotate certificates:
In OneLogin, navigate to your Dragonfly Cloud application
Go to the Access -> SSO tab
Check the X.509 Certificate section for expiration date
If the certificate is near expiration:
- OneLogin may automatically generate a new certificate
- Update the certificate in Dragonfly Cloud by refreshing the metadata URL
- Or manually copy the new certificate from OneLogin to Dragonfly Cloud
Update before expiration to prevent authentication failures
Best Practices
- Use Metadata URL: Configure Dragonfly Cloud with OneLogin's metadata URL for automatic updates
- Enable SCIM: Enable SCIM provisioning to automate user lifecycle management
- Use Roles: Assign the application to OneLogin roles rather than individual users for easier management
- Test First: Always test SSO and SCIM configuration changes with a test user before rolling out
- Monitor Logs: Regularly review OneLogin's events and provisioning logs
- Certificate Monitoring: Set reminders to check certificate expiration dates
- Security Policies: Leverage OneLogin's security policies for MFA, IP restrictions, etc.
- User Portal: Enable portal visibility to allow users to easily access Dragonfly Cloud from their OneLogin dashboard