SafeNet Trusted Access for Gigya
SafeNet Trusted Access (STA) allows you to configure the Gigya application using the Security Assertion Markup Language (SAML) protocol.
The STA and Gigya integration is aimed to protect the Gigya end users' access.
The following use cases can be configured for Gigya:
Configuring SafeNet Trusted Access for Gigya is a three-step process:
2.SafeNet Trusted Access setup
NOTE This application integration online help was produced based on a review of publicly available documentation and was not tested by Thales. Support for the application integration is provided on a best-effort basis.
•Extract the ISSUER/ENTITY ID and SINGLESIGNONSERVICE fields' values from the STA console.
You can copy the field values by clicking the Copy to Clipboard icon available next to the respective fields.
•Download the Identity Provider signing certificate from the SafeNet Trusted Access console by clicking the Download X.509 certificate button.
You will need the fields' values and the certificate while configuring STA in Gigya.
For more information, refer to the Configure the SAML service provider section of the STA online documentation.
Perform the appropriate steps to configure SafeNet Trusted Access as your Identity Provider in Gigya.
Click here to refer to the Gigya documentation.
After configuring SafeNet Trusted Access in the Gigya application, the next step is to activate the Gigya application in SafeNet Trusted Access by performing the following steps:
1.In the Applications pane, you will notice that the Gigya application that you added previously is currently in inactive state by default. To configure and activate the application, click on the Gigya application and proceed to the next step.
2.Under STA Setup, perform the following steps:
a.Click Upload Gigya Metadata to perform service provider configuration using the metadata.
b.On the Metadata upload window, click Browse to search and select the Gigya metadata.
Under Account Details, the service provider's metadata information is displayed.
NOTE If metadata upload gets failed, click Manual Configuration to switch to the manual configuration.
For more information on configuring the SAML service provider, refer to the Configure the SAML service provider section of the STA online documentation.
NOTE Under Return Attributes, add return attribute(s) as required by the Gigya application.
3.Under Advanced Settings, perform the following steps:
a.In the IDP INITIATED SSO RELAY STATE field, enter the relay state value if your application requires a unique relay state.
b.In the LOGOUT CHANNEL field, select an option that is compatible with your application.
For rest of the fields, modify the default values as per your preferred configuration.
4.Click Save Configuration to save the details and activate the Gigya application in SafeNet Trusted Access.
Navigate to the Gigya URL, enter your email address, and click Sign In. You will be redirected to the SafeNet Trusted Access sign-in page. Enter your primary directory login information, approve the two-factor authentication, and you should be redirected to the Gigya application after authentication.
Navigate to the User Portal URL to log in to the STA User Portal dashboard. On the dashboard, you will see a list of applications to which you have access. Click on the Gigya icon, you should be redirected to the Gigya application after authentication.
© 2021 SafeNet Trusted Access. Various trademarks are held by their respective owners.