Set up SAML with FusionAuth ============================ This article explains how to set up SAML with `FusionAuth `_ for an organization in Aiven. For more information on SAML and instructions for other identity providers, see the :doc:`Set up SAML authentication ` article. Prerequisite steps in Aiven Console ------------------------------------ #. In the organization, click **Admin**. #. Select **Identity providers**. #. Click **Add identity provider**. #. Enter a name and select SAML. You can also select the groups that users will be added to when they sign up or log in through this authentication method. #. Click **Add method**. You are shown two parameters needed to set up the SAML authentication in FusionAuth: * Metadata URL * ACS URL Configure SAML on FusionAuth ---------------------------- The setup on FusionAuth has three parts: * create an API key * generate a custom RSA certificate * create an application First you need to create an API Key in your FusionAuth instance: #. In FusionAuth, go to **Settings** > **API Keys**. #. Click the **Add** icon. #. Enter a description for the key (for example, "Certificate generator"). #. In the **Endpoints** list, find ``/api/key/import``. #. Toggle on **POST**. #. Click the **Save** icon. .. image:: /images/platform/howto/saml/fusionauth/create-api-key.png :alt: Creating API Key. #. On the **API Keys** page, find your new key and click on the value in the **Key** column. #. Copy the whole key. You'll use this for the script. .. image:: /images/platform/howto/saml/fusionauth/grab-api-key.png :alt: Grabbing API Key. #. Clone `the FusionAuth example scripts GitHub repository `__. .. code:: shell git clone git@github.com:FusionAuth/fusionauth-example-scripts.git cd fusionauth-example-scripts/v3-certificate #. Run the ``generate-certificate`` script. .. code:: shell ./generate-certificate #. Give the key a meaningful name (for example, "Aiven key"). #. Copy the generated certificate that the script creates. You now have a certificate in the **Key Master** in your FusionAuth instance. Next, create an application in your FusionAuth instance: #. In **Applications**, click the **Add** icon. #. Enter a name for the application (for example, "Aiven"). #. On the **SAML** tab, and toggle on the **Enabled** switch. #. Paste the **Metadata URL** and **ACS URL** you copied from the Aiven Console to the **Issuer** and **Authorized redirect URLs** fields in your FusionAuth application, respectively. .. list-table:: :header-rows: 1 :align: left * - Aiven - FusionAuth * - Metadata URL - Issuer * - ACS URL - Authorized redirect URLs #. In the **Authentication response** section, change the **Signing key** to the API key you created. #. Click the **Save** icon to save your application. #. On the **Applications** page, click the magnifying glass. #. In the **SAML v2 Integration details** section, copy the **Entity Id** and **Login URL**. Finish the configuration in Aiven --------------------------------- Go back to the **Authentication** page in `Aiven Console `_ to enable the SAML authentication method: 1. Select the name of the FusionAuth method that you created. 2. In the SAML configuration section, click **Edit**. 3. Toggle on **IdP login**. 4. Add the configuration settings from FusionAuth: * Set the ``SAML IDP Url`` to the ``Login URL`` from FusionAuth. * Set the ``SAML Entity ID`` to the ``Entity Id`` from FusionAuth. * Paste the certificate from the ``Generating certificate`` in FusionAuth into the `SAML Certificate`` field. 5. Click **Edit method** to save your changes. 6. Toggle on **Enable authentication method** at the top of the page. 7. In the **Signup and link accounts URLs** section, copy the appropriate link and send it to your users to switch them to the new IdP: * **Signup URL**: For users that don't have an Aiven user account and need to create a new Aiven user linked to this IdP. * **Account link URL**: For users that already have an Aiven user account to link their existing Aiven user with the configured IdP. .. note:: If you set up a SAML authentication method before and are now switching to a new IdP, existing users need to log in with the new account link URL to finish the setup. Troubleshooting --------------- If you have issues, you can use the `SAML Tracer browser extension `_ to check the process step by step.