Skip to main content
Skip table of contents

Standard SSO Integration (SAML)

Outlining Webassessor Single-Sign-On (SSO) integration using Security Assertion Markup Language (SAML) instead of OAuth2.

Article_Divider.png

This document outlines Webassessor Single-Sign-On (SSO) integration using Security Assertion Markup Language (SAML) instead of OAuth2. Both approaches are offered by Kryterion, Inc. to its clients.

Before implementing SAML into Webassessor it is important to understand that SAML, unlike OAuth2, has just two entities,

  • Identity Provider (IdP) – Always the Client.

  • Service Provider (SP) – Always Webassessor.

The following high-level overview of Kryterion’s standard Webassessor SSO integration using SAML summarizes the applicable implementation integration points and boundaries. 

References:

[SAML]: The SAML specification documentation is available at: http://saml.xml.org/saml-specifications

Pre-requisites:

  • Since the SSO follows SAML specification, in order for a client to be able to effectively integrate with Webassessor for SSO, the client should either have an in-house IdP server or should be able to use a 3rd party IdP like Okta, Salesforce, etc. 

  • Client should be created in the Webassessor system as an entity and region with a brand since they are part of communication during SSO calls.

Integration Points and Flows

standard-sso-saml.jpg

Implementation Steps

Step 1: Client provides the SAML IdP server details

Before the integration can be set up, Kryterion’s Webassessor system needs certain values in order to communicate with the client IdP (Identity Provider) server. The client will provide SAML IdP server details (URL & login information) for Kryterion to register Webassessor as an application authorized to have access to the client’s User Profile information.

Metadata URI

Metadata URL address of SAML IdP server that will provide authorization

IDP ID/URI

Identity URL address of SAML IdP server that will provide authorization

Step 2: Client adds Webassessor information into their system

  1. SSO URI:

    1. Sandbox: https://sb01.webassessor.com/SsoService/saml/SSO

    2. Production: https://www.webassessor.com/SsoService/saml/SSO

  2. Metadata URL:

    1. Sandbox: https://sb01.webassessor.com/SsoService/saml/metadata

    2. Production: https://www.webassessor.com/SsoService/saml/metadata

Step 3: Client uses the following links to initiate the SSO workflow

  1. Sandbox: https://sb01.webassessor.com/SsoService/doSaml?provider={PROVIDER}&brand={BRAND}

  2. Production: https://www.webassessor.com/SsoService/doSaml?provider={PROVIDER}&brand={BRAND}

  3. {PROVIDER} and {BRAND} values are unique to each Client


Access to certain features is restricted based on role type in an effort to reduce item exposure and promote process integrity. Please see the member role description page for information on permissions.


We’d Appreciate Your Feedback!

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.