Prolaborate enables access to Enterprise Architect models through SAML Single Sign-on capability.
While this integration should work with any identity provider, the tested ones are Microsoft ADFS, Okta, and Mini Orange
In this guide, we will learn how to configure SAML Single Sign-on for various providers.
Click on Menu > SAML Settings to go to the settings page.
First you need to configure Prolaborate’s settings (The service provider), then the Identity Provider, and finally decide what access needs to be given for users logging in through their SSO credentials.
Prerequisite: Your Prolaborate site should have a valid SSL certificate and at least one repository should be added.
Please configure as below:
|Name and ACU||These fields will be prefilled|
|Certificate file||Choose the .pfx file of your SSL certificate|
|Certificate password||Enter the password of the .pfx file|
|Identity Provider||Select ADFS if you are using it, select Others if you are using any other vendor.|
|Name and Sign in URL||Get this information from your Identity Provider|
|Certificate File||Get this information from your Identity Provider. You need to select a .cer or .cert file.|
Sign in URL should be App Access URL. You can get it from App Properties tab in Azure Active Directory.
The user attribute configuration should be done as below:
Sign in URL should be in this format:
https://[Identity Provider Domain URL]/ui/v1/myconsole
Here is a sample configuration:
You can choose any one of the following options: