Collibra Console SSO configuration

You can access Collibra Console with user accounts that are created within Collibra Console. Besides those user accounts, you can also configure single sign-on (SSO) access to enable integration with your SSO infrastructure.

Tip If you want to use a custom certificate in the SSO configuration for Collibra Console access, see this section.

Prerequisites

  • Your identity provider (IDP) supports SAML 2.0.

Steps

  1. Open Collibra Console with a user profile that has at least the ADMIN role.
    Collibra Console opens with the Infrastructure page.
  2. In the main menu, click Console settings.
  3. In the tab panebar, click Configuration. In the tab panebar, click Configuration.
  4. In the middle column, click Security Configuration.
  5. Click Edit configuration.
  6. Enter the required information:
    SettingDescription
    Mode

    The SSO mode of Collibra Console. Collibra Console only supports SAML_ATTRIBUTES.

    Disable the Collibra Management console signin page

    When SSO is enabled, a user can still navigate to the /signin page and try to log in via that page. However, you can disable that page.

    • True: Users cannot access the Collibra Console signin page.
    • False (default): Users can access the Collibra Console signin page

    Default role

    The default role for all SSO users. The default role is READ.

    SSO users with a SUPER role will be downgraded to users with the ADMIN role. Only a Collibra Console SUPER user can enable the SUPER role for SSO users.

    Enable SSO SUPER users(**)

    • True: SSO users can have the SUPER role.
    • False (default): SSO users with the SUPER role will be downgraded to users with the ADMIN role.

    This option is only visible if you have the SUPER role.

    SAMLThe configuration of SAML.
     Metadata HTTP
    The URL of the SAML metadata file to be used. The URL always has to be reachable by the Collibra environment.
     Entity ID

    The entity ID inside the metadata to be referenced.

    Note A metadata file can describe multiple entity IDs, make sure to use in the entity ID from the correct metadata file.

     Consumer service URL

    By default, this URL is the same as the URL of your Collibra environment but if your IDP expects another value, you can fill it out here.

    Warning Make sure that the intended destination endpoint (The Destination attribute in the SAML response) matches the URL being used here. So this is only to be used in specific IDP circumstances When setting this, and getting the error "SAML message intended destination endpoint did not match recipient endpoint" check the Destination attribute in your SAML response and this parameter.

     Disable client address
    • True: The validation of the client IP address in the assertion message is disabled.
    • False (default): The validation of the client IP address in the assertion message is enabled.
     Sign authentication requests (Requires restart)
    • True: Authentication requests have to be signed. Use a Collibra generated self-signed certificate to sign requests. The request that is generated by Collibra Console will be appended with a signature in the redirect URL of the response.
    • False (default): Authentication request don't have to be signed.
     Force authn
    • True (default): The SP authentication request forces re-authentication.
    • False: The SP authentication request does not force re-authentication.
     Force passive

    Configure whether the SP authentication should set the authentication to go passive.

    If True, the IDP or browser MUST NOT take visibly control of the user interface. See the SAML 2.0 specification for more details.

    This is only relevant if Force authn is True.

     Name ID

    Configure the nameID used in the SP authentication. If set, the full content will be sent as a nameID. Use a fully qualified nameID.

    Default nameID="urn:oasis:names:tc:SAML:2.0:nameid-format:persistent". See SAML 2.0 specification for accepted nameID values.

     Group to Role mapping
    Map groups from the group field to a role in the Collibra Console. The Field key must be a name of a group as defined in your IDP, the Field value is one of the Collibra Console roles (READ, ADMIN, SUPER).
     Attribute fields
    The mappings of attributes in the SAML response. The values are used as keys to look for in the SAML response.
     Username

    The mapping for the user's username. The value of this attribute must be the name of the SAML attribute as defined in your IDP.

    In the following example, the value in Collibra Console must be email. This is the used name in your IDP software, see the following screenshot.

    Okta SAML settings email attribute

    This field is mandatory.

     Role

    The mapping for the user roles. The value of this attribute must be the name of the SAML attribute as defined in your IDP.

    In the following example, the value in Collibra Console must be role. This is the used name in your IDP software, see the following screenshot.

    Okta SAML configuration role attribute

     Group

    The mapping to define which attribute holds group information. The value of this attribute must be the name of the SAML attribute as defined in your IDP.

    In the following example, the value in Collibra Console must be groups. This is the used name in your IDP software, see the following screenshot.

    Okta SAML configuration group attribute

    If there is more than one group attribute statement, add them as comma-separated list.

     SAML Requested authentication context
    Settings for the SAML requested authentication context. The authentication context is the way in which the IDP authenticates the user. By default the authentication context will mandate user/password authentication over HTTPS.
     Disable
    Disable the SAML requested authentication context. Set to True if you wish to configure the IDP to use specific authentication contexts, without the need to send one in the request.
     Comparison type

    Specifies the comparison method used to evaluate the requested authentication context. One of: "exact", "minimum", "maximum", "better".

    The industry default is "exact", other options are "minimum", "maximum" and "better".

    • Exact: The authn context in the assertion MUST exactly match the full expected context specified on the SP.
    • Minimum: The authn context in the assertion MUST be at least as strong as one of the contexts specified on the SP.
    • Better: The authn context in the assertion MUST be stronger than any of the contexts specified on the SP.
    • Maximum: The authn context in the assertion MUST be as strong as possible for all of the contexts specified on the SP, without exceeding the strength of at least one context.

    For more details, see the SAML 2.0 specification (Section 3.3.2.2.1).

     Reference list
    All SAML authentication classes to be sent in the SAML authentication request. Use to tune the authentication context on the IDP side. Default="urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport" (Which means user/password over HTTPS). For more details, see the SAML 2.0 specification (Section 3.3.2.2.1 & Section 2.7.2.2).
     Declaration list
    All SAML authentication declarative classes to be sent in the SAML authentication request. For details, see the SAML 2.0 specification (Section 3.3.2.2.1 & Section 2.7.2.2).
    SignoutThe sign-out redirection settings.
     Override signout URL
    Enable this option to redirect to another page than the default sign-out page. The default page when you sign out is the Collibra Console sign-in page.
     Signout redirect URL
    The URL to redirect to when you sign out.
  7. Click Save all.