Single-Sign On (SSO) Purpose

The purpose of Single-Sign On (SSO) is to configure Single-Sign On between your company and FitLyfe for user access to the system.

There might be an additional charge for configuring this module 

Single-Sing On (SSO) Overview

The SSO Tab may be used to configure SSO between your company and FitLyfe. This configuration allows the employee to use Single-Sign On to log into FitLyfe. 

To access this tab, click on Admin > Client Setting at the top of the dashboard. Then select the SSO Tab

How to Set Up Single-Sign On with SAML

The SSO Tab contains two SAML Configuration sections. The section titled SAML Configuration should be used to enter your company single-sign on information. It includes the following fields: 

  • Issuer - This is the URL for the Identify Provider's (IDP's) metadata.
  • Single Sign On (SSO) URL -  The URL for the identity provider login endpoint.
  • Single Log Out (SLO) URL - The URL for the identity provider logout endpoint.
  • X509 Certificate - Your digital  certificate for verifying your public key. Copy and paste this information into this field. 

The bottom section titled SAML Configuration for your Identify Provider (IDP) contains configuration information of the identity provider or IDP. In this case, FitLyfe is the IDP.

Each field in this section may be copied and pasted accordingly. You may use the Copy to Clipboard option located on the right of each field to do so.

You will see the following fields and information shown in these fields is provided by FitLyfe for SSO: 

  • Metadata URL - Metadata URL of the IDP. This will need to be copied. 
  • Issuer - This is the entity ID of your provider (FitLyfe).
  • Single Sign On (SSO) URL - This is the single-sign on URL of your provider.
  • SAML Attributes Mapping - This is the SAML Attributes Mapping of your provider. Below is a sample SAML Attributes Mapping.

A checkbox can be found below this information and will need to be checked to enable Single-Sign On. Once finished, click on Save to save the configuration. 

Sample SAML Attribute Mapping
<saml:AttributeStatement>
   <saml:Attribute
      Name="Unique ID"
      NameFormat="urn:oasis:names:tc:SAML:2.0:
         attrname-format:basic" 
      <saml:AttributeValue xsi:type="xs:string">
abc@example.com
      </saml:AttributeValue>
   </saml:Attribute>
</saml:AttributeStatement>