Edgio

Authentication

You can configure Lightweight Directory Access Protocol (LDAP) and Security Assertion Markup Language (SAML) authentication types. This capability is intended for customers who use an SSO provider such as Okta or Ping Identity and allows customers to integrate authentication into their overall SSO capability.
By default, each company has Basic authentication enabled. Basic authentication is the standard type where users log into Control using their user, password, and 2FA authentication token. You cannot delete, edit, or deactivate the Basic authentication configuration.
The information in this section assumes you understand LDAP and SAML.
- Only users with the Company Admin role can create configurations.
- You can create at most one configuration of each type (LDAP and SAML).
- The authentication capability is available only for companies that have the Authentication product.

Creating a Configuration

Creating an LDAP Configuration

  1. On the Authentication List Page click the New LDAP button.
    The New LDAP page is displayed.
  2. Enter information in the fields (see Fields on the New LDAP Page).
  3. Click the Save button to persist the configuration.

Fields on the New LDAP Page

FieldDescription
ActiveIndicates whether the configuration is active.
Base DNBase Distinguished Name. Uniquely identifies the entry and its position in the directory information tree (DIT) hierarchy. Consists of the Organization Unit (ou) and Domain Components (dc).
Server URLAddress of the LDAP server that responds to client requests for information such as login credentials.

Creating a SAML Configuration

Edgio’s SAML configurations are accessed over SSL to implement a secure connection.
  1. On the Authentication List Page click the New SAML button.
    The New SAML page is displayed.
  2. Enter information in the fields (see Fields on the New SAML Page).
  3. Click the Save button to persist the configuration.

Fields on the New SAML Page

FieldDescription
ActiveIndicates whether the configuration is active.
Certificate (base64)Certificate text, including the -----BEGIN CERTIFICATE----- and -----END CERTIFICATE----- markers.
Certificate fingerprintThe DER-encoded certificate’s hash.
Fingerprint algorithmHashing algorithm that generated the fingerprint.
Idp Entity idGlobally unique name for the SAML entity, either an Identity Provider (IdP) or a Service Provider (SP).
Idp SSO urlWeb address of the SAML IdP that handles sign-in requests.
User identifier attribute nameDefines the attribute to be sent by your SSO system to Control and used by Control to log in.
Attributes vary depending on the SSO system, so this field allows you to define your own specific attribute name.

As an example, assume the user identifier attribute name is ‘EmailAddress’. On login, the SSO system sends an assertion request to Control with ‘EmailAddress’ = ’user@mail.com’. Control will look for the ‘EmailAddress’ attribute in the assertion and try to authenticate the user with user@mail.com, which is the same as logging in to Control with login = user@mail.com on Control’s login screen.
Defaults to ‘UserID’.
Private keyThe unique string specific to you that you created when you requested the certificate with a Certificate Signing Request (CSR).
SSO URL (Assertion URL)Required by some SSO Identity Providers when a configuration is being created, before the LDP SSO url has been issued. Users can copy and paste as needed into other fields such as ldp SSO Id.
SP Entity IDRequired by some SSO Identity Providers when a configuration is being created, but before the SP Entity ID has been issued. Users can copy and paste as needed into other fields such as ldp Entity Id.

Editing a Configuration

  1. On the Authentication List Page click the configuration’s edit (pencil) icon.
    The Edit configuration page specific to the authentication type (SAML or LDAP) is displayed.
  2. Modify the fields on the page (see Fields on the New SAML Page and Fields on the New LDAP Page).
  3. Click the Save button to persist the changes.
You can only edit LDAP and SAML configurations.

Testing a Configuration

  1. Click the configuration’s edit (pencil) icon on the Authentication List Page.
    The Edit configuration page specific to the authentication type (SAML or LDAP) is displayed.
  2. Click the Test Configuration button at the bottom of the page.
    The TEST CONFIGURATION dialog is displayed.
  3. Enter information in the dialog. The information requested depends on the authentication type.
Authentication TypeFields
SAMLUsername - a valid Control user name
LDAPControl user email and password.
  1. Click the Test Configuration button in the dialog. Test results depend on the authentication type.
Authentication TypeResults
SAMLResults open in a new browser tab.
LDAPResults are displayed as a JSON object at the bottom of the dialog.
Sample success LDAP Response
JSON
1{
2 "telnetSuccessful": true,
3 "authSuccessful": true,
4 "telnetTime": 175,
5 "exceptionMessage": null
6}
You can only edit LDAP and SAML configurations.
  1. Click the Test Configuration button in the dialog. Test results depend on the authentication type.

Activating a Configuration

  1. Hover the mouse pointer over a row on the Authentication List Page.
  2. Click the Activate button.
    The Active status changes to yes and the Activate button label changes to Deactivate.
You can also active the configuration using the following steps:
1. Click the edit (pencil) icon for the configuration on the Authentication List Page.
2. On the Edit configuration page, put a checkmark in the Active checkbox.
3. Click the Save button.

Deactivating a Configuration

  1. Hover the mouse pointer over a row on the Authentication List Page.
  2. Click the Deactivate button.
    The Active status changes to no and the Deactivate button label changes to Activate.
You cannot deactivate the configuration if it is the only active configuration. You can also deactivate the configuration with these steps:
1. Click the edit (pencil) icon for the configuration on the Authentication List Page.
2. On the Edit configuration page, remove the checkmark in the Active checkbox.
3. Click the Save button.

Deleting a Configuration

  1. Click the configuration’s remove (trash can) icon on the Authentication List Page.
  2. Click the Delete button in the dialog that prompts you to remove the entry.
    Control deletes the configuration.
- You cannot delete a configuration if it is the only active configuration.
- You cannot undo a deletion.