1. Overview
4. Configuration Information: Configuring a Service Provider
i. Social Provider Metadata Configuration
ii. Metadata Configuration - Shibboleth SP
5. Configuration Information: Social IDP Integration
i. Initial Social Provider API integrations
ii. Adding Additional Service Providers with Same Social Provider API integrations
iii. Adding Authorized Redirect URIs to Social Provider Developer Consoles
iv. Managing Social Provider Integrations
Many applications provide a way to enable login from one of several social identity providers (Google, Microsoft, LinkedIn, or others). These solutions tend to only work with a single application, whereas end users rarely use a single application in an organization.
The Cirrus Gateway is a general purpose solution that allows any of a number of social providers to be integrated with any organization application or hosted service that supports the SAML v2.0 authentication protocol. When the Gateway is used in conjunction with the Cirrus Identity Provider Proxy, customers have a central point to manage social logins. This can be used for a suite of applications or services, more protocol options (including CAS), and additional proxy capabilities.
The Cirrus Gateway currently supports the following social providers:
Provider |
Protocol |
Useful Links |
Notes |
|
OpenID Connect |
||
Microsoft |
OpenID Connect |
This includes Outlook, Hotmail, MSN, Skype, and Windows Live accounts; Office365 domain accounts can also be used if the API integration is properly configured. |
|
|
OpenID Connect |
||
Amazon |
OAuth2 |
Cirrus Identity continually evaluates the social login offerings based on social provider API support, customer needs, and changes in end user utilization of different social login platforms.
5) From the Cirrus Console, an org admin will create the SP in the Console so it can be configured (not for Proxy integration). At this point, the org admin may designate an SP admin to complete the setup.
6) From the Cirrus Console, an admin will enable the desired social providers specific to the SP (this may be a subset of social providers allowed at the org level). The admin will need a developer account for each social provider to complete the API integration. For each enabled social provider, the admin will follow the instructions available in the Console integrate the Social Provider (see Gateway - Social IdP Integration).NOTE - Customers using the Cirrus Identity Provider Proxy
If you are integrating your SP with the Cirrus Identity Provider Proxy then you probably want to be consuming the metadata for your specific proxy, not the Gateway bundle. Proxies are customer specific and you'll want to follow our instructions on consuming customer metadata.
Social Provider Metadata
An aggregate of the social provider metadata is available at the following URL:
https://md.cirrusidentity.com/metadata/CirrusIdentitySocialProviders-metadata.xml
You can also find per entity metadata for each IdP endpoint for the social providers.
Provider | Metadata |
---|---|
<a data-preserve-html-node="true" href=https://md.cirrusidentity.com/metadata/CirrusIdentitySocialProviders-Google-metadata.xml>https://md.cirrusidentity.com/metadata/CirrusIdentitySocialProviders-Google-metadata.xml | |
Microsoft | <a data-preserve-html-node="true" href=https://md.cirrusidentity.com/metadata/CirrusIdentitySocialProviders-Live-metadata.xml>https://md.cirrusidentity.com/metadata/CirrusIdentitySocialProviders-Live-metadata.xml |
<a data-preserve-html-node="true" href=https://md.cirrusidentity.com/metadata/CirrusIdentitySocialProviders-LinkedIn-metadata.xml>https://md.cirrusidentity.com/metadata/CirrusIdentitySocialProviders-LinkedIn-metadata.xml |
$config = array(
'sets' => array(
'incommon' => array(
'cron' => array('daily'),
'sources' => array(
array(
'src' => 'https://md.cirrusidentity.com/metadata/CirrusIdentitySocialProviders-metadata.xml',
),
),
'expireAfter' => 60*60*24*4, // Maximum 4 days cache time.
'outputDir' => '<path to local directory>',
'outputFormat' => 'serialize',
),
)
);