Overview
Implementing single sign-on (SSO) provides secure authentication for users and simplifies the sign-in experience. Once enabled, users need only sign in once to your SSO identity provider to gain access to all their applications, including CrashPlan. This article explains how to configure SSO in your CrashPlan environment.
For more information about how CrashPlan implements SSO, see our Introduction to single sign-on .
Supported SSO identity providers
CrashPlan supports any SSO identity provider that is SAML 2.0-compliant. The steps in this article give an overview of how to configure an SSO identity provider that supports the SCIM 2.0 protocol. This article assumes you are already familiar with SSO and the SAML standard.
For directions specific to our supported SSO identity providers, see:
- Configure Microsoft Entra ID for SSO in your CrashPlan environment
- Configure Google for SSO in your CrashPlan environment
- Configure InCommon for SSO in your CrashPlan environment
- Configure Microsoft AD FS for SSO in your CrashPlan cloud environment
- Configure Okta for SSO in your CrashPlan cloud environment
- Configure OneLogin for SSO in your CrashPlan cloud environment
- Configure PingOne for SSO in your CrashPlan cloud environment
- Configure Shibboleth for SSO in your CrashPlan cloud environment
Considerations
External authentication systems
CrashPlan technical support can help with authentication issues caused by interaction with CrashPlan products. However, troubleshooting authentication issues outside your CrashPlan environment is beyond the scope of our technical support engineers. For assistance with external authentication systems, contact your authentication vendor.
- To use this functionality, you must be assigned the Identity Management Administrator role.
- CrashPlan usernames must match SSO usernames. How you accomplish this depends on how you deploy CrashPlan apps.
- CrashPlan supports service provider-initiated SSO but does not support identity provider-initiated SSO. Therefore, users cannot sign in to your CrashPlan environment from the identity provider's website or application, but instead must log in using a browser bookmark.
- SSO provides user authentication but does not provide user management. Set up SCIM provisioning or use the CrashPlan console to manage users.
- CrashPlan does not support Single Logout (SLO). Users must sign out of the identity provider to end their single sign-on session.
- The CrashPlan console expects SAML assertions to be signed. To configure CrashPlan to support advanced SAML request configurations, see Set SAML attributes for SSO in CrashPlan.
Compatible CrashPlan platform components
Compatible with SSO
- CrashPlan app for Windows, Mac, and Linux
- CrashPlan console
Before you begin
Verify identity provider configuration
- Make sure the SSL certificate of your SSO identity provider has been signed by a trusted Certificate Authority (CA).
- Make sure you have administrative access to the identity provider or have contact with an identity provider administrator.
Verify network configuration
- Configure your private network, Internet, and VPN settings to allow client devices to communicate with your identity provider on port 443. Test client connectivity to the identity provider before you proceed.
- If you want to use URL-based metadata exchange to configure CrashPlan and the identity provider to work together, make sure two-way communication is available between them on TCP port 443. If two-way communication is not available or not allowed, you must download the identity provider's metadata file and make it accessible to CrashPlan.
- Confirm the required ports with your identity provider to determine if custom ports are being used.
Determine whether you need to configure multiple CrashPlan tenants
Before you begin configuring SSO for CrashPlan, consider whether your company has more than one CrashPlan tenant that you need to connect to your SSO identity provider. Large companies and organizations often have separate, dedicated CrashPlan cloud instances (or "tenants") in use by different groups or departments.
If you have more than one CrashPlan tenant to connect to your SSO identity provider, you need to obtain an entity ID URL for each CrashPlan tenant. An entity ID is a unique string that identifies a specific tenant to your SSO identity provider. The tenant-specific entity ID URL is composed of the CrashPlan domain followed by the tenant ID, and can be found in the CrashPlan service provider metadata URL file in each tenant. For example:
"entityId": "https://example.com/42424daa-424c-4e42-42c4-c424242420d4"
Step 1: Determine the URLs for your CrashPlan environment
When you configure an identity provider to connect to CrashPlan, typically you must provide the CrashPlan server login URL, entity ID, and Assertion Consumer Service (ACS) URL. To obtain these values:
- Sign in to the CrashPlan console.
- Navigate to Administration > Integrations > Identity Management.
- Locate the CrashPlan service provider metadata URL:
- When setting up an authentication provider for the first time, the URL appears on the main screen:
- If you previously set up an authentication provider, the URL appears in the authentication provider details:
- When setting up an authentication provider for the first time, the URL appears on the main screen:
- The first portion of the URL is your CrashPlan server URL, for example, https://example.com. Record this URL for use later.
To determine the login URL, add /login to the end. For example, https://example.com/login. - Copy the CrashPlan service provider metadata URL and paste it in the address bar of a new browser window.
Your CrashPlan environment's metadata details appear.Metadata displays incorrectly in Safari
The Crashplan service provider metadata page will not load correctly in Apple's Safari browser. Paste the metadata URL into the address bar of an alternative browser to view the correct output before you continue.
- Find the entityID. Record this URL for use later.
- Find the AssertionConsumerService and its Location URL value, for example, Location="https://example.com/api/SsoAuthLoginResponse". Record this URL for use later.
Step 2: Configure your SSO identity provider
The following configuration tasks are common to most SSO identity providers. The steps for configuration vary by SSO identity provider. See your provider's documentation for more details.
Configure your connection to CrashPlan
All SSO identity providers require you to enter URLs pointing to CrashPlan. These typically include URLs for the server sign-in (add \login
to the server URL), the entity ID, and the Assertion Consumer Service (ACS) (which typically ends with /api/SsoAuthLoginResponse
). Use the values you obtained in Step 1.
For example:
-
Sign-in URL:
https://example.com/login
-
Entity ID:
https://example.com
-
Assertion Consumer Service (ACS) URL:
https://example.com/api/SsoAuthLoginResponse
Note that these settings may be labeled differently in your SSO identity provider.
Copy the identity provider metadata
Each SSO identity provider provides metadata that must be provided to the target system, either in the form of a URL pointing to the metadata XML file, or the metadata file itself.
From the SSO identity provider, either copy the URL of the metadata XML file, or download the metadata XML file. In the next step, you will either paste the URL or upload the file when you add your SSO identity provider as an authentication provider in CrashPlan.
Configure attribute mapping to CrashPlan (Optional)
To ensure seamless single sign-on, many SSO identity providers require that you map attributes of users in their system to attributes of users in the target system). Although the attributes in your SSO identity provider may differ from those in the table below, use mappings similar to the following to map to CrashPlan:
Attribute in SSO identity provider | Attribute in CrashPlan |
---|---|
uid | |
givenName | First name |
sn | Last name |
Configure SAML attributes (Optional)
You can integrate any SAML 2.0-compliant identity provider with CrashPlan. By default, you map an identity provider's username and email attributes to CrashPlan. For added security and flexibility, you can use SAML attributes settings to set the SAML 2.0 context and class references in your identity provider's SSO requests, as well as the digest and signature algorithms to use.
For valid values to enter, see Set SAML attributes for SSO in CrashPlan.
Step 3: Add your SSO identity provider as an authentication provider
- Sign in to the CrashPlan console.
- Navigate to Administration > Integrations > Identity Management.
- Click Add authentication provider.
The Add Authentication Provider dialog appears.
- In Display Name, enter an identity provider name to display to users who sign in with SSO.
If your CrashPlan environment provides more than one SSO identity provider, users see a list of providers to choose from. They must select the provider configured for their CrashPlan organization. - In Provider's Metadata, ensure that Enter URL is selected and paste the URL for the identity provider metadata XML file, or click Upload XML File and select the XML file for upload. Custom domains are not supported
When entering the URL for the XML metadata file, custom domains are not supported. You must use the standard domain of your identity provider. - Click Create Provider.
Authentication provider settings appear.
Provider information message
Note the following message on the dialog:
This provider will not be applied to an organization until you update the organization security settings.
Do not apply this authentication provider to organizations yet. You will apply this provider to a test organization and to production organizations in later steps. - If you choose not to use default mapping, you can use Attribute Mapping to customize mappings between CrashPlan platform user attributes and authentication provider SSO assertion attributes.
- Click Edit .
- Deselect Use default mapping.
- Configure mapping settings for each CrashPlan platform user attribute.
Each field supports up to 128 characters.-
Username: Specify the identity provider's name ID or attribute that maps to the CrashPlan username.
- Select Use nameid to use the identity provider's name ID.
- Select Use attribute tag to enter a custom identity provider attribute.
- Email (Use nameid only): Enter the identity provider attribute that contains user email addresses.
- First Name: Enter the identity provider attribute that contains user first names.
- Last Name: Enter the identity provider attribute that contains user last names.
-
Username: Specify the identity provider's name ID or attribute that maps to the CrashPlan username.
- Click Save.
- (Optional) Local Users displays the current user. If there are any other users you want to exempt from using this authentication provider to log in, enter them here.
Step 4: Test SSO authentication
To avoid impacting your production environment, use a test organization to verify that SSO is working properly.
- Create a test user in your identity provider.
- Sign in to the CrashPlan console.
- Create a test organization.
- Create a user in the test organization who matches the identity provider test user.
- Configure the test organization to use SSO:
- Navigate to Administration > Integrations > Identity Management.
- Select the authentication provider.
- Click Edit next to Organizations in use.
- Select the test organization.
Note that you can also use an organization's settings to select an authentication provider to use for SSO. - Click Save.
- In the upper-right of the CrashPlan console, select Account > Sign Out.
- Sign back in to the CrashPlan console as the test user to verify that SSO is working.
Step 5: Configure organizations to use SSO
- Sign in to the CrashPlan console.
- Navigate to Administration > Integrations > Identity Management.
- Select the authentication provider.
- Click Edit next to Organizations in use.
- Select organizations to use the authentication provider for SSO.
If applicable, select Inherits settings to identify whether an organization inherits the setting from its parent organization. To enable SSO for all organizations, select the top-most organization. (Note that you can also use an organization's settings to select an authentication provider to use for SSO.) - Click Save.
Step 6: Add new users that sign in with SSO
Option A: Add users in the CrashPlan console
Use the CrashPlan console to add users to an organization that uses SSO.
- Verify that the users in the organization exist in the SSO identity provider used by the organization.
- Make sure that the CrashPlan environment usernames match the SSO usernames.
Option B: Deploy the CrashPlan app
New user accounts created with silent SSO registration are created automatically in CrashPlan.
What to expect
Reduced authentication prompts
When users sign in with SSO, they do not need to re-enter credentials for subsequent authentication attempts until the SAML authentication token expires. A SAML token applies to an application rather than a device, which means that a user might need to enter credentials again when signing into a different app.
For example, the single sign-in process differs whether users sign in to the CrashPlan console or the CrashPlan app:
- CrashPlan console: When users sign in to the CrashPlan console, they are redirected in the web browser to sign in to their SSO identity provider. As soon as they sign in to their identity provider, the CrashPlan console launches.
- CrashPlan app: When users sign in to the CrashPlan app, following message appears: "To complete the sign in process, go to your web browser. This screen updates automatically once login is successful." A web browser window is automatically opened so they can complete the sign-in process in their SSO identity provider. As soon as they sign in to their SSO identity provider in the provided web browser window, the CrashPlan app launches.
Losing access to an identity provider
If a user loses access to the identity provider, the CrashPlan app continues to back up, uninterrupted.
External resources
- Wikipedia:
- SAML 2.0 specifications