Configure SAML or OIDC Federation for Your Organization

This section contains instructions on how to configure SAML or OIDC federation for your organization domain.

Prerequisites

Before you start establishing federated single sign-on for your organization account users, make sure that the following information is available:

Configure SAML or OIDC authentication both on the Authorization service (Smart Trading Cloud) for Smart Trading Cloud services, for example, Onboarding and Testing Cloud Service, and on the identity provider sides.

Group Mapping

While configuring the OIDC federation for your organization, you can also configure user group mapping. This allows you to specify attribute name in your IdP token which Smart Trading Cloud will use to automatically update the list of groups to which a logged-in user belongs.

To enable mapping of attributes to the user groups, you must ensure the following:

  • The name of the group in external IdP must be the same as the name of the group in Smart Trading Cloud.

  • If a user belongs to more than one group, the attribute (claim) in the IdP token must list all these groups:

  • For the attribute type string, list the group names separated by comma (,), semicolon (;), pipe (|), colon (:), or slash (/).

  • For the attribute type array of strings, list each group as an element.

Note: Group mapping is not supported for the Administrators group. You must add users manually to the Administrators group.

Warning Edifecs does not recommend that you enable SAML or OIDC authentication if your account users work with the Smart Trading Cloud artifacts through the following on-premise Edifecs applications:
- Edifecs Application Manager (version 9.2.3.1 or earlier)
- XEngine (version 9.2.3.1 or earlier)
- SpecBuilder (version 9.2.3 or earlier)
- XES Module for FHIR (version 9.2.3.1 or earlier)