Configuring SAML Single Sign-On for Zoho Directory Users11 minutes to read
Note: The procedure outlined in this document applies only till PAM360 builds 7301. For builds 7400 and above, please refer to this help document. ManageEngine PAM360 supports Single Sign-On (SSO) using SAML 2.0, enabling seamless integration with Federated Identity Management Solutions. In addition to popular IdPs such as Okta, Microsoft Entra ID, ADFS, and Google, PAM360 offers native support for SAML-based SSO through Zoho Directory. In this setup, PAM360 functions as the Service Provider (SP) while Zoho Directory serves as the Identity Provider (IdP). Organizations can centralize the authentication process while ensuring compatibility with existing Federated Identity Management frameworks by leveraging Zoho Directory as the IdP. This simplifies user management, enhances security, and provides a hassle-free, single-login experience across applications. The integration process involves supplying details about SP to IdP and vice-versa. Once the integration is complete, users only need to log in to Zoho Directory and access PAM360 directly from its GUI without re-entering their PAM360 credentials, enabling a streamlined and secure authentication experience. Additionally, the integration supports Single Logout (SLO), ensuring that when users log out from one application, they are automatically logged out from all connected applications, thereby maintaining secure and efficient user session management. Notes:
This document covers the following topics in detail:
Follow these steps to seamlessly integrate PAM360 with Zoho Directory, enabling a smooth and secure SAML SSO experience. 1. PrerequisitesTo configure PAM360 as an SP in the Zoho Directory, you need SP details displayed on the Configuration For Single Sign-On Using SAML page, under the Service Provider Details section. These details are necessary for setting up PAM360 as an SP on Zoho Directory, ensuring a seamless integration between PAM360 and Zoho Directory. Explore this link for the detailed steps to obtain the required SP details for configuring PAM360 as an SP on the Zoho Directory portal. 2. Adding PAM360 as an Application in Zoho DirectoryFollow these steps to add PAM360 as an application in the Zoho Directory portal.
Note: For SAML SSO authentication, the Assertion Consumer Service (ACS) URL is the hostname of the PAM360 server by default. Follow these steps to update the ACS URL: Note:
3. Assigning Zoho Directory Users to PAM360 ApplicationFollow these steps to assign Zoho directory users to the PAM360 application.
Notes: You can export the users from the Zoho Directory using the available export option and import them into PAM360. During such import operations, ensure to select the username in the import field with the data you have selected in the Application Username filed while creating PAM360 as the custom application. 4. Configuring SAML SSOAfter configuring PAM360 as an SP in the Zoho Directory portal, you must configure Zoho Directory as an Identity Provider (IdP) in PAM360 to establish it as a trusted entity. Access the PAM360 browser window and proceed with the IdP configuration starting from Step 2 - Configure Identity Provider Details. Explore this link for the detailed IdP configuration steps. Based on the provided steps, configure Zoho Directory as an IdP and enable SAML Single Sign On on the PAM360 interface. Follow these steps to access the IdP details required to configure Zoho Directory as a trusted IdP on PAM360:
After successfully configuring SAML SSO, you can verify whether the single sign-on feature is working as intended in your environment. To validate if single sign-on works, click the Open App button beside the Test SSO button on the PAM360 integration window within the Zoho Directory portal. Note: To bypass SAML Single Sign-On and use local authentication to access PAM360, use the following skip URL: https://hostname:port/PassTrixMain.cc?skipsamlsso=true Notes:
| ||||||||||||||||||||||||||||||||