Single Sign-On

Single Sign-On

JESI Company Accounts now have the opportunity to have Single Sign-On activated.

Single sign-on (SSO) in enterprise refers to the ability for employees to log in just one time with one set of credentials to get access to all corporate applications, websites, and data for which they have permission. SSO solves key problems for the business by providing: Greater security and compliance

SAML 2.0 Compliant Identity Provider Configuration

Security Assertion Markup Language (SAML) is an open standard to securely exchange authentication and authorization data between an enterprise Identity Provider and JESI (the Service Provider)

SAML 2.0 Sign-On Experience

JESI currently supports the Identity Provider Login experience

Identity Provider Initiated Login Experience

With the Identity Provider initiated login experience, users directly access the enterprise’s login manager and sign in to confirm their identity. The enterprise’s Identity Provider sends the SAML2 response directly to the JESI platform. The user is logged in and redirected to the JESI application where they can access resources without requiring further authentication

SAML responses will be matched to pre-configured JESI accounts by an email address attribute assertion. JESI accounts will only be matched if they reside within the context of the configured Identity Provider

Service Provider Initiated Login Experience

Note: Service Provider (SP) initiated enterprise logins are expected to be supported in the future. The experience will differ from Identity Provider Initiated

Single Logout (SLO) Experience
JESI supports the SAML2 Identity Provider initiated Single Logout flow to terminate active user session(s)

Note: Logging out of JESI will terminate the user’s current session and will require re-authentication for access. JESI does NOT support Service Provider initiated SLO

Joining the Organisation Automatically
JESI currently requires user accounts to be created and activated within the JESI platform prior to access being granted via an enterprise Identity Provider

Note: Just in Time (automatic) provisioning of JESI accounts will be supported in the future. Currently, users must have an account set up prior to using SSO (at this stage, the simplest way to do this is to import users)

Configure your JESI access with a SAML Identity Provider

JESI Service Provider Configuration

For configuration within an identity provider, the following settings should be used

Setting Description Value
Entity ID JESI Service Provider Entity ID https://api.jesi.io/
Metadata URL XML document containing information necessary for interaction with SAML-enabled identity providers. The document contains e.g. URLs of endpoints, information about supported bindings, identifiers and public keys. https://apiv2.jesi.io/sso/saml2/metadata
Reply/ACS URL The reply URL will be the destination in the SAML response for IDP-initiated SSO. https://apiv2.jesi.io/sso/saml2/acs
HTTP-POST
Logout URL URL to send the SAML Logout response back to the application. https://apiv2.jesi.io/sso/saml2/logout
HTTP-POST
Login URL URL contains the sign-in page for this application that will perform the service provider-initiated single sign-on. Not currently available
Authn Requests Signed Service Provider requests will be signed true
Want Assertions Signed Identity Provider Assertion responses will be signed true
Encrypted Assertions JESI supports encrypted SAML2 assertion responses. The Identity Provider can optionally encrypt the assertion portion of the SAML2 responses. All SAML2 traffic to and from the JESI platform is already encrypted using HTTPS, but this adds another layer of security. optional

Identity Provider Configuration Required by JESI
For configuration within JESI, the following settings need to be provided.

Setting Description Optionality
Entity ID This will be the audience of the SAML response for IDP-initiated SSO. Required
X509 Certificate BCertificate, encoded in the BASE 64 format, for the enterprise Identity Provider. This is the certificate that allows JESI to verify the digital signature in the SAML responses sent to it from the enterprise Identity Provider. Required
Login URL (Redirect) Identity Provider’s Login URL (that supports HTTP Redirect binding) that JESI should use to allow a member to sign in. Used in the future to enable Service Provider Initiated Login Optional
Login URL (HTTP-POST) BIdentity Provider’s Login URL (that supports HTTP POST binding) that JESI should use to allow a member to sign in. Used in the future to enable Service Provider Initiated Login Optional

Contact the administrator of the Identity Provider if you need help determining which source of metadata information you need to provide.

User Attributes and Claims

JESI requires the following attribute information to be received from the Identity Provider when a user signs in.

Claim Name Description Optionality
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameidentifier Unique User Identifier. Persisted to support Identity Provider logout requests. Required
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress User’s Email address. Used to match to an enabled JESI account. Required
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/givenname User’s Given Name. Will be used in the future for Just in Time provisioning. Required
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/surname User’s Surname. Will be used in the future for Just in Time provisioning. Required
http://jesi.io/sso/saml/2021/01/identity/claims/title User’s Position Title. Will be used in the future for Just in Time provisioning. Missing values will be prompted for completion by the user prior to account provisioning. Optional
http://jesi.io/sso/saml/2021/01/identity/claims/mobilenumber User’s Position Title. Will be used in the future for Just in Time provisioning. Missing values will be prompted for completion by the user prior to account provisioning. Optional

Note: The mobilenumber claim will be used in the future to enhance the just-in-time account provisioning.