Online Help

SafeNet Trusted Access for Slido


SafeNet Trusted Access (STA) allows you to configure the Slido application using the Security Assertion Markup Language (SAML) protocol.

The STA and Slido integration is aimed to protect the Slido end users' access.

The IdP-initiated SSO use case can be configured for Slido.

Configuring SafeNet Trusted Access for Slido is a three-step process:

1.Slido setup

2.SafeNet Trusted Access setup

3.Verify Authentication

NOTE   This application integration online help was produced based on a review of publicly available documentation and was not tested by Thales. Support for the application integration is provided on a best-effort basis.

Slido Setup

As a pre-requisite, download the Identity Provider metadata from the SafeNet Trusted Access console by clicking the Download metadata file button. You will need the metadata while configuring STA in Slido.

NOTE   If the STA certificate is required separately, first you need to click on the Manual Configuration link and then click Download X.509 certificate to download the certificate.

Perform the appropriate steps to configure SafeNet Trusted Access as your Identity Provider in Slido.

Click here to refer to the Slido documentation.

SafeNet Trusted Access Setup

After configuring SafeNet Trusted Access in the Slido application, the next step is to activate the Slido application in SafeNet Trusted Access by performing the following steps:

1.In the Applications pane, you will notice that the Slido application that you added previously is currently in inactive state by default. To configure and activate the application, click on the Slido application and proceed to the next step.

2.Under STA Setup, perform the following steps:

a.Click Upload Slido Metadata to perform service provider configuration using the metadata.

b.On the Metadata upload window, click Browse to search and select the Slido metadata.

Under Account Details, the service provider's metadata information is displayed.

NOTE   If metadata upload gets failed, click Manual Configuration to switch to the manual configuration.

For more information on configuring the SAML service provider, refer to the Configure the SAML service provider section of the STA online documentation.

NOTE   Under Return Attributes, add return attribute(s) as required by the Slido application.

3.Under Advanced Settings, perform the following steps:

a.In the IDP INITIATED SSO RELAY STATE field, enter the relay state value if your application requires a unique relay state.

b.In the LOGOUT CHANNEL field, select an option that is compatible with your application.

For rest of the fields, modify the default values as per your preferred configuration.

4.Click Save Configuration to save the details and activate the Slido application in SafeNet Trusted Access.

Verify Authentication

Using STA Console

Navigate to the Slido URL, enter your email address, and click Sign In. You will be redirected to the SafeNet Trusted Access sign-in page. Enter your primary directory login information, approve the two-factor authentication, and you should be redirected to the Slido application after authentication.

Using STA User Portal

Navigate to the User Portal URL to log in to the STA User Portal dashboard. On the dashboard, you will see a list of applications to which you have access. Click on the Slido icon, you should be redirected to the Slido application after authentication.


© 2021 SafeNet Trusted Access. Various trademarks are held by their respective owners.