Set up SAML authentication
- Updated: 2023/09/04
Set up SAML authentication
Switch user authentication for Control Room from Control Room database to SAML single sign-on (SSO).
Prerequisites
When using SAML for authentication, use the network access capabilities of the IdP to restrict access of the Control Room to specific allowed IP addresses. Ensure all allowed IP addresses configured are removed from the Control Room network settings before switching to SAML for authentication. For more information, see Allowed IP addresses.
Ensure that you are logged in to the Control Room as the administrator.
Before you set up authentication for the Control Room, setup tasks (such as introducing credentials on a new system and importing users) might be required. If you import users, then you must also include matching user IDs, email addresses, first and last names, in both the Automation Anywhere credentials and matching records to log in after the SAML integration. For example, if using Okta as a SSO, then users must have matching IDs, email addresses, first name and last names in both Automation Anywhere and Okta to log in after the SAML integration.
You should have the required user information and certificate ready. Typical user information consists of user ID, first and last name, and an email address.
After switching to SAML authentication, any users with non-SAML IdP formatted IDs will not be able to log in. You need to verify that any bots in the private workspace of such users are exported beforehand so that the bots can be imported for their new SAML SSO enabled user accounts.
Much of this configuration relies on third-party applications to create the necessary metadata. If you require more specific configuration information based on a specific provider, see Configure SSO authentication with Okta.
To switch the Control Room to SAML SSO, follow these steps.