BitDefender - SSO configuration
This documentation has been tested and approved by Kelvin Zero's team
This documentation provides a step-by-step guide to setting up Single Sign-On (SSO) for Bitdefender GravityZone using MPAS. SSO simplifies user authentication by allowing access to multiple applications with a single set of credentials. This integration enhances security and improves user experience across your organization.
To set up Multi-Pass with Bitdefender GravityZone, ensure you meet the following requirements:
- Bitdefender GravityZone admin rights
- MPAS Admin rights
- Make sure that all users intended to use SSO in Bitdefender GravityZone are registered in your IdP and have the necessary permissions to access Bitdefender GravityZone.
Important: Custom elements in URLs (like realm names) are case sensitive. Make sure to match the exact casing from your environment.
Important: Super Admin can't use the SSO, it is a security from BitDefender to always allows one person to reach admin settings in case there is trouble with the SSO
BitDefender - SSO configuration
- Log in to GravityZone Control Center with admin rights.
- On the right side click on the icon called User menu
- Click on My Company
- Go to the authentication tab and locate the section called Single Sign On using SAML
- First, on the line GravityZone SAML metadata URL, click on the icon on the right to copy the URL.
- Paste it in your browser and right click, "save as" to create an XML file.
- This file will be uploaded in MPAS
- Now you have an empty field called Identity provider metadata URL, paste the link you can find below.
- https://ca.auth.kzero.com/realms/<TENANT_NAME>/protocol/saml/descriptor
- Open Multi-Pass Dashboard.
- Select your tenant.
- Go to Integrations and click on Applications.
- In the Custom section, choose SAML.
- Click on Upload file and use the metadata you gathered from Bitdefender.
- It should automatically complete the fields :
Click on Add integration
On the left side, click on Advanced console
Click on client
Use the search bar to look for bitdefender
We are now going to verify that all the fields are correctly completed :
General settings
Access settings
SAML Capabilities
| Setting | Value |
|---|
| Force Name ID Format | OFF |
| Force POST Binding | ON |
| Include AuthnStatement | ON
|
Signature & Encryption
| Setting | Value |
|---|
| Sign Documents | OFF |
| Sign Assertions | ON |
- Now that you have checked the different parameters, change to the tab called Keys.
- You will see both paramaters switched to ON
- Now go to the Advanced tab.
- The field Assertion Consumer Service POST Binding URL must equal the Valid Redirect URIs (ACS).
Related Articles
Mulesoft - SSO Integration
This application has been formally tested by Kelvin Zero Inc. This documentation provides a step-by-step guide to setting up Single Sign-On (SSO) for Mulesoft using Multi-Pass. SSO simplifies user authentication by allowing access to multiple ...
SAML SSO Integration Guide
This guide provides an overview of how to configure SAML Single Sign-On (SSO) between Multi-Pass and a third-party Service Provider (SP). Multi-Pass acts as the Identity Provider (IdP) in this federation model. Multi-Pass is working on SCIM support ...
Zoho One - SSO configuration
This documentation has been tested and approved by Kelvin Zero's team This documentation provides a step-by-step guide to setting up Single Sign-On (SSO) for Zoho One using MPAS. SSO simplifies user authentication by allowing access to multiple ...
D2L Brightspace - SSO Integration
This application has not been formally tested by Kelvin Zero Inc. It is provided solely as a reference guide. If you encounter any issues, kindly submit a ticket directly through the support desk. This documentation provides a step-by-step guide to ...
Vanta - SSO configuration
This documentation has been tested and approved by Kelvin Zero's team This documentation provides a step-by-step guide to setting up Single Sign-On (SSO) for Vanta using MPAS. SSO simplifies user authentication by allowing access to multiple ...