Overview
Configure Maverics to use 1Kosmos as an IDP using the SAML protocol.
Go to Identity Fabric
Select 1Kosmos (SAML)
Configure 1Kosmos
Use a Secret Provider
Production settings ought to implement a secret management system. Maverics connects with multiple secret management systems, which keep secrets that Orchestrator instances retrieve during startup. To cite a secret from your provider, enclose the name in angle brackets. (e.g. <app client-id>)
Learn more about Secret Providers
Name | Description | Example |
|---|---|---|
Name | The friendly name of your provider. | onekosmos |
Metadata URL | This is the metadata URL from the application configured in the SAML provider. This setting will accept a file:/// URI if the metadata file is saved on a filesystem accessible to the Orchestrator user. |
|
Consumer Service (ACS) URL | The URL that the SAML provider will use to POST the SAML response. The Mavericks SAML ACS handler will be served on this URL, as such it should not conflict with the path of any application resources. The path can be arbitrary (e.g. /maverics-saml or /saml-handler), but must match the provider's configuration for the specified Entity ID. |
|
Identifier (Entity ID) | The unique Enterprise Application identifier. |
|
{
"connectors": [
{
"name": "onekosmos",
"type": "onekosmos",
"samlMetadataURL": "https://example-com.1kosmos.net/default/metadata",
"samlConsumerServiceURL": "https://maverics.example.com/1k-acs",
"samlEntityID": "https://example.com"
}
]
}connectors:
- name: onekosmos
type: onekosmos
samlMetadataURL: "file:///etc/maverics/samlmetadata.xml"
samlConsumerServiceURL: "https://maverics.example.com/1k-acs"
samlEntityID: "https://example.com"
errorPage: "https://example.com/login-error"