Skip to main content
Feedback

Setting up SSO with file sharing

SSO integration with File Sharing is a three-part process:

  1. Customers are provided the information to set up the application in their identity provider (IdP).
  2. Once the customer has registered the application(s) in the IdP, specific parameters are provided to MFT to configure our side of the integration.
  3. We will schedule a meeting to test your SSO application(s).

Setting up your SSO process

Use the following to create a SAML 2.0 SSO application in their identity provider’s portal:

  • MFT Single sign URL = https://filesharingsiteurl/saml/AssertionConsumerService.aspx

  • MFT Entity ID (in Okta called Audience URI)

    • US: ServiceProvider Name="urn:componentspace:ThruSite_US"
    • UK: ServiceProvider Name="urn:componentspace:ThruSite_UK"
    • AUS: ServiceProvider Name="urn:componentspace:ThruSite_AUS"
    • GER: ServiceProvider Name="urn:componentspace:ThruSiteEU"

During the application process, make sure these claims are mapped to your Active Directory:

  • emailaddress - (mandatory)

  • givenname - (mandatory) if it does not exist in iDP, create a custom claim

  • surname - (mandatory) if it does not exist in iDP, create a custom claim

  • phone - (optional), if it does not exist in iDP, create a custom claim

  • company - (optional), if it does not exist in iDP, create a custom claim

note

In the 2nd step, we need the information from your identity provider.

In the 3rd step, MFT Customer success team follows up with you to schedule a meeting. In this meeting, we will test the SSO application links and verify that users can authenticate and that new users get created successfully.

On this Page