# Auth0

{% hint style="success" %}
Please complete the steps in the [Admin Console Configuration](https://docs.keeper.io/en/sso-connect-cloud/admin-console-configuration) section first.
{% endhint %}

<figure><img src="https://2503956294-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-MB_i6vKdtG6Z2n6zWgJ%2Fuploads%2FDKHb5LKnfViGjrgSgWxj%2FAuth0.jpg?alt=media&#x26;token=3ab7c553-a847-450f-b7bb-f40f918afebe" alt=""><figcaption></figcaption></figure>

### Auth0 SSO Configuration

Login to the Admin section of the Auth0 portal.

<figure><img src="https://2503956294-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-MB_i6vKdtG6Z2n6zWgJ%2Fuploads%2F3JcpuHO5e0twOvHvjBhX%2FAuth0%20login%20screen.png?alt=media&#x26;token=ba586dce-3eef-4b0c-89f8-f80cea9c035d" alt=""><figcaption></figcaption></figure>

Select the **Applications** tab and click **Create Application**. Choose **Regular Web Applications**.

![Applications > Create Application > Regular Web Applications](https://2503956294-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-MB_i6vKdtG6Z2n6zWgJ%2Fuploads%2Fr124wM40qFJEJfo1Oxqj%2FAuth0%20create%20app.png?alt=media\&token=f63a3595-db60-4a66-b8fc-3b0cdc47a82d)

Next, go to the **Addons** tab and click **SAML2 WEB APP**.

![Addons > SAML2 WEB APP](https://2503956294-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-MB_i6vKdtG6Z2n6zWgJ%2Fuploads%2Fqzlh4VdkKxjB9v9D57jT%2FAuth0%20SAML.png?alt=media\&token=179ed127-9335-40f4-b76d-5fe5b657c761)

On the Settings page that comes up next, you will need the “Assertion Consumer Service (ACS) Endpoint” that comes from the Keeper Admin Console.

**Example Assertion Consumer Service (ACS) Endpoint:**\
<https://keepersecurity.com/api/rest/sso/saml/**XXXXXXXX>\*\*

This value can be found under the SSO Connect Cloud configuration as part of the Service Provider information, as seen below:

![View Configuration](https://2503956294-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-MB_i6vKdtG6Z2n6zWgJ%2F-MEtbWq4sZZ-S3UIt9QM%2F-MEtl4LaKREAPjKH9I9i%2FScreen%20Shot%202020-08-16%20at%201.03.35%20PM.png?alt=media\&token=69130879-79d5-4636-8bfa-f1c43a680260)

![Copy the Assertion Consumer Service (ACS) Endpoint](https://2503956294-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-MB_i6vKdtG6Z2n6zWgJ%2Fuploads%2FY5N6HUU6RnVdzZJUQrqu%2FAuth0%20SSO%20config2.png?alt=media\&token=66baa744-270f-4e64-9df7-8e9cec6d11ed)

Paste the Assertion Consumer Service (ACS) Endpoint into the Application Callback URL field in the Auth0 screen.

![](https://2503956294-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-MB_i6vKdtG6Z2n6zWgJ%2Fuploads%2Fl5BV7LF2b0mIg0D9HhH1%2FAuth0%20ACS.png?alt=media\&token=c8d5fa4b-ff1a-4821-a3fe-b01d01c8fc0b)

Next, remove the sample JSON in the SAML2 Web App editor window, and replace with the following:

```
{
  "audience": "https://keepersecurity.eu/api/rest/sso/saml/XXXXX",
  "mappings": {
    "email": "Email",
    "given_name": "First",
    "family_name": "Last"
  },
  "createUpnClaim": false,
  "passthroughClaimsWithNoMapping": false,
  "mapUnknownClaimsAsIs": false,
  "mapIdentities": false,
  "nameIdentifierFormat": "urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress",
  "nameIdentifierProbes": [
    "http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress"
  ]
}
```

The value for “audience” is the Entity ID. This can also be found under the SSO Connect Cloud configuration as part of the Service Provider information:

![Copy the IDP Initiated Login Endpoint](https://2503956294-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-MB_i6vKdtG6Z2n6zWgJ%2Fuploads%2Ft7nekJZOkd98aNvGfCHn%2FScreenshot%202023-04-05%20at%2017.09.46.png?alt=media\&token=fdd1326c-b84c-40cf-b3ee-5e2420acacfd)

Once you've added the Entity ID, you can click the **Debug** button to verify there are no formatting issues.

![](https://2503956294-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-MB_i6vKdtG6Z2n6zWgJ%2Fuploads%2Fp4E9Z1HYUrPaxtVgOGT3%2FAuth0%20debug.png?alt=media\&token=5b55ffe5-166c-4b42-9943-a24e3be07f10)

Next, scroll down to the bottom of the SAML2 Web App window and click **Save**.

<figure><img src="https://2503956294-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-MB_i6vKdtG6Z2n6zWgJ%2Fuploads%2FbKQoZXhHHMyiHiT7KTvs%2FScreenshot%202023-04-06%20at%2012.01.16.png?alt=media&#x26;token=eca684bc-382f-449c-98c0-26f9fc64f486" alt=""><figcaption><p>Save changes made to the SAML2 Web App settings</p></figcaption></figure>

Next, click on the **Usage** tab and download the Identity Provider Metadata file.

<figure><img src="https://2503956294-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-MB_i6vKdtG6Z2n6zWgJ%2Fuploads%2FJqW5Q1jyGDAExjXeEbat%2FScreenshot%202023-04-05%20at%2017.16.37.png?alt=media&#x26;token=4797b59e-bef4-4ac8-837b-bcba589b2569" alt=""><figcaption><p>Download IdP metadata</p></figcaption></figure>

On the Keeper side, edit the SSO configuration and select GENERIC as the IDP Type. You can upload the metadata.xml file into the Keeper SSO Connect interface by browsing to or dragging and dropping the file into the Setup screen:

![Edit the SSO Configuration](https://2503956294-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-MB_i6vKdtG6Z2n6zWgJ%2F-MI0Ehtokcy7-95E09iW%2F-MI0H-4Va4lgDpVR1nCL%2FScreenshot%202020-09-24%20at%2011.01.20.png?alt=media\&token=9f4ab437-371e-408b-8e6a-8851f81ce7cf)

![Drag and Drop the Metadata File you downloaded from Auth0 into Keeper](https://2503956294-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-MB_i6vKdtG6Z2n6zWgJ%2Fuploads%2FVPURdYEwhm8PG2QMt4Rd%2FAuth0%20upload%20meta%20to%20keeper.png?alt=media\&token=36f16970-3001-475c-8ea9-314f746f0870)

#### Move existing users/initial admin to SSO authentication

Users created in the root node (top level) will need to be migrated to the sub node that the SSO integration was configured on. If users remain in the root node, they will be prompted for the master password when accessing the vault and/or admin console.

{% hint style="warning" %}
An admin can not move themselves to the SSO enabled node. It requires another admin to perform this action.
{% endhint %}

After the user is moved to the SSO enabled node, they need to log into the Keeper vault initially by selecting the "Enterprise SSO" pull down and inputting in the Enterprise Domain configured on the SSO integration. The user may get prompted to confirm by entering in the master password.

<figure><img src="https://2503956294-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-MB_i6vKdtG6Z2n6zWgJ%2Fuploads%2FfFPNzWDvSwH48ebLJOeY%2FSSO_Login.png?alt=media&#x26;token=f7bc0249-986d-427d-9746-0e7873ff7840" alt=""><figcaption><p>Initially select 'Enterprise SSO Login'</p></figcaption></figure>

Once the user has authenticated with SSO, they only need to use their email address moving forward to initiate SSO authentication. They won't have to enter the Enterprise Domain.

<figure><img src="https://2503956294-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-MB_i6vKdtG6Z2n6zWgJ%2Fuploads%2FDrVwIHQiMQDtlxeJey0G%2Fvault_Login.PNG?alt=media&#x26;token=2e435451-c23e-41bd-91e2-8ec49a216c16" alt=""><figcaption></figcaption></figure>

If typing in the email address and clicking Next does not route the user to the desired SSO, ensure that just-in-time provisioning is enabled in the Keeper SSO configuration and ensure that your email domain is reserved by Keeper. More information regarding routing and domain reservation [can be found here](https://docs.keeper.io/enterprise-guide/domain-reservation).
