Steps to configure SAML SSO for Front
About Front
Front is an AI-powered customer service platform designed to enhance team collaboration and deliver exceptional service. It consolidates all service channels into one inbox, allowing teams to work together seamlessly across email, chat, SMS, and more.
The following steps will help you enable single sign-on (SSO) for Front from Identity360.
Prerequisites
- The MFA and SSO license for Identity360 is required to enable SSO for enterprise applications.
- Log in to Identity360 as an Admin, Super Admin, or Technician with a role that has Application Integration and Single Sign-on permissions.
- Navigate to Applications > Application Integration > Create New Application, and select Front from the applications displayed.
Note: You can also find Front from the search bar located at the top.
- Under the General Settings tab, enter the Application Name and Description.
- Under the Choose Capabilities tab, choose SSO and click Continue.
General Settings of SSO configuration for Front.
- Under Integration Settings, navigate to the Single Sign On tab, then click Metadata Details. Copy the Login URL and Signing Certificate. These will be used later during the configuration of Front.
Integration Settings of SSO configuration for Front.
Front (service provider) configuration steps
- Log in to your Front application as an administrator.
- Go to the Settings and select Preferences.
- Under Company preferences, click Single Sign On.
- Select SAML from the drop-down list.
Front app SSO settings.
- In the Entry Point textbox, paste the Login URL copied in step 6 of the prerequisites.
- Select HTTP Redirect from the Authentication request binding drop-down.
- Select PasswordProtectedTransport from the Requested authentication context type drop-down.
- In the Signing certificate textbox, paste the Signing Certificate copied in step 6 of the prerequisites.
- Click Save.
Front SAML SSO configuration.
- Scroll down to the Service provider settings section, and copy the Entity ID, which will be used during Identity360 configuration.
Front service provider settings.
Identity360 (identity provider) configuration steps
- Switch to Identity360's application configuration page.
- Enter the Sub Domain of your Front account. For example, if your Front app's Entity ID copied in step 10 of Front configuration is https://xyz.frontapp.com, then xyz is the Sub Domain you should use.
- Enter the Relay State parameter, if necessary.
Note: Relay State is an optional parameter used with a SAML message to help you remember where you were or to direct you to a specific page after logging in.
- Click Save.
Integration Settings of SSO configuration for Front.
- To learn how to assign users or groups to one or more applications, refer to this page.
Your users will now be able to sign in to Front through the Identity360 portal.
Note: For Front, both SP-initiated and IdP-initiated flows are supported.
Steps to enable MFA for Front
Setting up MFA for Front using Identity360 involves the following steps:
- Set up one or more authenticators for identity verification when users attempt to log in to Front. Identity360 supports various authenticators, including Google Authenticator, Zoho OneAuth, and email-based verification codes. Click here for steps to set up the different authenticators.
- Integrate Front with Identity360 by configuring SSO using the steps listed here.
- Now, activate MFA for Front by following the steps mentioned here.
How does MFA for applications work in Identity360?