Adobe - SSO Configuration

Adobe - SSO Configuration

Idea
This documentation has been tested and approved by Kelvin Zero's team
Quote
This documentation provides a step-by-step guide to setting up Single Sign-On (SSO) for Adobe using Multi-Pass. SSO simplifies user authentication by allowing access to multiple applications with a single set of credentials. This integration enhances security and improves user experience across your organization.
Warning
To configure Multi-Pass SSO with Adobe, ensure you meet the following requirements:
- Adobe Administrator access
- MPAS Admin rights
- All users intended to use SSO in Adobe must be registered in your IdP and have the necessary permissions.
Important: Custom elements in URLs (like tenant names or unique strings) are case sensitive. Match the exact casing from your environment.




Adobe - SSO Configuration





Step 1 - Obtain Tenant XML Metadata from Multi-Pass (IdP)

  • Open Multi-Pass Dashboard
  • Select the correct tenant and go to Integrations, click on Applications.
  • Select SAML in the custom integration section.

  • Select Download under Tenant XML data and save the file locally.

Step 2 - Configure Adobe as the Service Provider (SP)

  • Log into the Adobe Admin Console as an Administrator.
  • Select Settings from the top bar.
  • Select Create directory on the Identity Settings screen.

  • Set the Directory Name to KZero Passwordless.
  • Select Federated ID as the directory type.

  • Select Other SAML Providers.

  • Click Download Adobe metadata and save the file locally.

  • Select Upload IdP Metadata under Step 2 and upload the metadata file obtained in Step 1.

  • Click Next.
  • Select Enabled beside Enable auto-account creation for this identity provider.
  • Select your Default Country.
  • Set Update user information in Admin Console when users sign in to Don’t Update.

  • Click Next.
  • In your newly created Directory, go to the Domains tab.
  • Click Add domain.

  • Select Add domains via DNS proof.

  • Type in the domains you want to configure for SSO and select Next.
  • Adobe will provide you with a TXT Record for each domain. Log into your DNS Manager and configure the TXT Record(s).
  • In the Domains tab in Adobe, click Validate beside the domain. It should change to an Active status.


Step 3 - Configure Multi-Pass as the Identity Provider (IdP)

  • Open Multi-Pass Dashboard
  • Select the correct tenant and go to Integrations, click on Applications.
  • Select SAML in the custom integration section.

  • Select Upload File and upload the Adobe Service Provider Metadata you obtained in Step 2.

  • Confirm/Complete the remaining fields based on the table below:
FieldValue
Client ID (=SP Entity ID)https://federatedid-na1.services.adobe.com/federated/saml/metadata/alias/<UNIQUE_STRING>
Nameadobe
DescriptionAdobe SSO integration
Assertion Consumer Service URLhttps://federatedid-na1.services.adobe.com/federated/saml/SSO/alias/<UNIQUE_STRING>
NameID Policy Formatemail
Go to the Advanced Console
  • Click Add Integration (if you have not already saved the client).
  • Browse to the Advanced Console by clicking on the left side of your screen.

  • Click Clients and use the search bar to look for adobe.
  • Make sure all the fields are populated as shown below.
General settings (Multi-Pass)
FieldValue
Client IDhttps://federatedid-na1.services.adobe.com/federated/saml/metadata/alias/<UNIQUE_STRING>
Nameadobe
DescriptionAdobe SSO integration
Always display in UIOFF
Access settings (Multi-Pass)
FieldValue
Home URL (IdP-initiated)https://ca.auth.kzero.com/realms/<TENANT_NAME>/protocol/saml/clients/<APP_NAME>
Valid Redirect URIs (ACS)https://federatedid-na1.services.adobe.com/federated/saml/SSO/alias/<UNIQUE_STRING>
IDP-Initiated SSO URL Name<APP_NAME>
SAML Capabilities
SettingValue
Name ID Formatemail
Force Name ID FormatON
Force POST BindingON
Include AuthnStatementON
Signature & Encryption
SettingValue
Sign DocumentsOFF
Sign AssertionsON
  • Move to the tab Keys and ensure that both parameters are set to OFF.


  • Select Add Mapper by ConfigurationUser Property and create the three mappers below.
SettingValue
NamefirstName
PropertyfirstName
SAML Attribute NameFirstName
SettingValue
NamelastName
PropertylastName
SAML Attribute NameLastName
SettingValue
Nameemail
Propertyemail
SAML Attribute NameEmail
    • Related Articles

    • D2L Brightspace - SSO Integration

      This application has not been formally tested by Kelvin Zero Inc. It is provided solely as a reference guide. If you encounter any issues, kindly submit a ticket directly through the support desk. This documentation provides a step-by-step guide to ...
    • Mulesoft - SSO Integration

      This application has been formally tested by Kelvin Zero Inc. This documentation provides a step-by-step guide to setting up Single Sign-On (SSO) for Mulesoft using Multi-Pass. SSO simplifies user authentication by allowing access to multiple ...
    • SAML SSO Integration Guide

      This guide provides an overview of how to configure SAML Single Sign-On (SSO) between Multi-Pass and a third-party Service Provider (SP). Multi-Pass acts as the Identity Provider (IdP) in this federation model. Multi-Pass is working on SCIM support ...
    • Miro - SSO configuration

      This documentation has been tested and approved by Kelvin Zero's team This documentation provides a step-by-step guide to setting up Single Sign-On (SSO) for Miro using MPAS. SSO simplifies user authentication by allowing access to multiple ...
    • Pipedrive – SSO configuration

      This application has been formally tested by Kelvin Zero Inc. This documentation provides a step-by-step guide to setting up Single Sign-On (SSO) for Pipedrive using Multi-Pass. SSO simplifies user authentication by allowing access to multiple ...