CustomerGauge's Single Sign On (SSO) functionality supports any system/identity provider (IDP) that is compliant with the SAML2.0 protocol. This includes both Standard and Custom/Company Specific systems.
Some examples of common standard systems are as follows:
How to Setup?
Please follow these steps in order to get everything set up:
- Navigate to the Settings --> Single Sign On (SSO) and click "+ Add IDP":
- In your IDP, you will need to copy the "Entity ID" and "Assertion Consumer Service URL" into the relevant areas for that in your IDP app configuration when setting up your app for CustomerGauge:
Note: If you use a system like Okta, the third item "Login URL" may also be required to enter into your IDP (so that it directs to the appropriate login page). If using other systems, please simply share this special login page with your users (after you've finished the remaining steps) so that they can log into CustomerGauge using the IDP(s) you've configured.
- Next, you will need to fill out the information of your Identity Provider:
Note: In the case of Metadata XML - URL is recommended because if things change, you wouldn't need to provide the new XML to CustomerGauge; we'd have the changes automatically as the XML is provided via URL. If you upload a file and things change, you may need to upload the new XML file to CustomerGauge in order to guarantee your SSO configuration continues to operate smoothly.
However, some systems, such as GSuite, do not provide the option of a metadata XML URL, and only provide a downloadable file. If that's the case, you can select the "File Upload" option from the dropdown instead:
Then simply click the "Browse File" button to upload the XML data from your local device, and be sure to re-upload a new one if things change in the future.
- Next, you must provide the User Attribute Mapping to ensure any data you want to be associated with a user is passed to CustomerGauge upon initial user creation. Before doing this though, it's important to understand how the user creation element works:
Once you've configured your SSO IDP, when someone tries to log in using their IDP credentials, CustomerGauge will check the email address of the user that the login request is coming from. If this is a new user and the same exact email address does NOT already exist in CustomerGauge, then we will create a user license in CustomerGauge for that user and will include any attributes you specify that have been mapped in the User Attribute Mapping section.
If, however, the email address of the user who initiated the login request already exists (existing user) with a username in CustomerGauge (meaning they've either already logged in via SSO once before, or they've had a username created manually by a CustomerGauge Admin), then CustomerGauge will just authenticate them and associate their SSO login request with that already-existing user. In this case, we will NOT look at the attributes being passed with the user, only the email address. Any changes to user attributes for users that already exist in CustomerGauge must be made in the CustomerGauge User Manager, which all Admins have access to.
OK, now that you understand the user creation element, here are the instructions for how to do the mapping. All you need to do is select the CustomerGauge Attribute name on the left and then enter the Attribute name as it's stored in your IDP on the right. As you might expect, based on the details provided above, mapping the "Email" attribute is mandatory. All other fields are optional. For more information on the user attributes we offer, please see this article.
For a handy infographic of which attributes feed into which sections of your User Manager Details Page, see here:
- Enter these remaining SSO Details and then "Save" once you are done!
- When you are ready, you can activate the SSO by either clicking this box and then "Save":
Or by going to your "Deactivated IDPs" section and clicking this checkmark:
Connecting multiple IDPs to 1 CustomerGauge platform
You may be in a situation where some of your users have access to Salesforce, but others don't. But they do have access to GSuite (or Okta, etc.). You can have as many IDPs connected to your CustomerGauge platform as you need! Most of our customers only require 1 or 2 max, but you can add more than that if your situation requires.
Using the same IDP for multiple CustomerGauge Platforms
You can use the same IDP for multiple CustomerGauge Platforms. Just configure the same settings in the other platform(s) using the steps above
Direct access for SSO Users
Your users may want to have the ability to log into CustomerGauge directly (not via SSO) using a username and password. As you saw in point 4 above, some of your users might have already had direct access prior to accessing CustomerGauge via SSO. However, if you have users who have only ever accessed CustomerGauge via SSO, they won't have direct access to CustomerGauge (yet). If they would like (not mandatory), they can also set up a direct access username and password with CustomerGauge from their "My Profile" page. This could be helpful in situations where the IDP you are using for SSO has an outage or your users get locked out of their IDP and need to access CG urgently.
Deleting SSO Users
Users who have SSO access to CustomerGauge cannot be deleted, but you can deactivate them. Deactivating users both prevents them from accessing CustomerGauge and also does not count towards your overall, contractual user license limit. We don't allow deletion of SSO users because the user would just end up being created again if they attempted to log into CustomerGauge from the IDP, unless you were to have deleted them or revoked their access from the IDP itself as well. Deactivation, therefore, is how you both prevent users from logging into CustomerGauge via SSO as well as maintaining your contractual user limit.
Handling SSO Users in your User Manager
Your User Manager comes with a few quick and easy ways to identify (and manage) SSO users. As mentioned previously, and changes you want or need to make to a user's attributes after they've already been created as a user in CustomerGauge can be handled in the User Manager by editing the user as normal. You also have the ability to filter between the different types of users (all user types, those who are direct access only, SSO access only, or both)