Blumira - SSO Configuration

This documentation has been tested and approved by Kelvin Zero's team

This documentation provides a step-by-step guide to setting up Single Sign-On (SSO) for Blumira using MPAS. SSO simplifies user authentication by allowing access to multiple applications with a single set of credentials. This integration enhances security and improves user experience across your organization.

To set up Multi-Pass with Blumira, ensure you meet the following requirements:
- MPAS: Admin rights
- Blumira: Admin rights and XDR access
Important: Custom elements in URLs (like realm names) are case sensitive. Make sure to match the exact casing from your environment.
Configuration of Blumira
Accessing Single Sign-On Settings
- On your dashboard, locate the left-hand menu.
- Click on "Settings".
- Scroll down and select "Single-Sign On"
- First, you need to enable the single then allow communication between MPAS and Blumira, follow these steps in MPAS
- Open MPAS in a separate browser tab by navigating to: https://dashboard.kzero.com/deployments
- Select Your Deployment
- Access the "Advanced console"
- Click on Clients
- Click on Create a Client to register a new client for communication with Blumira
- Complete the different fields
- Client type = Switch to SAML
- Client ID = you can find it on Blumira Metadata (urn:auth0:blumira:<SPECIFIC NAME>)
- Name = For example "blumira"
- Description = for example "SSO Integration"
- Always display in UI = Switch to "On"
- Click on "Next" and complete the fields below
- Home URL = https://ca.auth.kzero.com/realms/randintegration/protocol/saml/clients/blumira
- Valid redirect URIs = Blumira ACS URL (https://auth.blumira.com/login/callback?connection=<SPECIFIC NAME>)
- Valid post logout redirect URIs = Blumira Logout URL (https://auth.blumira.com/logout)
- IDP-Initiated SSO URL name = blumira
- Complete the last configuration and click on "save"
- SAML capabilities
- Name ID format - email
- Force POST binding - ON
- Include AuthnStatement - ON
- Signature and Encryption
- Sign documents - OFF
- Sign assertions - ON
- Scroll up and go to the keys section
- Make sure "Signing keys config" and "Encryption keys config" are turned off
- Go to the Advanced section
- Paste in Assertion Consumer Service POST Binding URL = Blumira ACS URL (https://auth.blumira.com/login/callback?connection=<SPECIFIC NAME>)
- Before returning to the Blumira SSO configuration, you need to obtain the certificate.
- In the bottom left of your screen, click on "Realm Setting".
- Select the Keys tab.
- Locate the RS256 row and click on Certificate to view or download it.
- Now that you're back on Blumira, complete the required fields:
- Domain: Enter the domain of your email address.
- Signing Certificate: Paste the X.509 certificate obtained from the RS256 line.

Do not forget to include the following header and footer -----BEGIN CERTIFICATE----- and -----END CERTIFICATE-----
- Sign In Endpoint: https://ca.auth.kzero.com/realms/<REALM NAME>/protocol/saml
- Sign Out Endpoint: https://ca.auth.kzero.com/realms/<REALM NAME>/protocol/openid-connect/logout
- Finally, click on Save to apply your changes.

Congratulations! The configuration is now complete. Login Process, when you log in using your email address, you will be redirected to Multi-Pass. Choose the digital option to receive a push notification for authentication.

Note on Two-Factor Authentication (2FA):
Please note that Blumira currently does not allow disabling 2FA, even when an external SSO like Multi-Pass is configured. This feature may be implemented in the future.
Related Articles
HaloPSA - SSO configuration
This documentation has been tested and approved by Kelvin Zero's team This documentation provides a step-by-step guide to setting up Single Sign-On (SSO) for HaloPSA using MPAS. SSO simplifies user authentication by allowing access to multiple ...
Auvik - SSO configuration
This documentation has been tested and approved by Kelvin Zero's team This documentation provides a step-by-step guide to setting up Single Sign-On (SSO) for Auvik using MPAS. SSO simplifies user authentication by allowing access to multiple ...
Datadog - SSO configuration
This documentation has been tested and approved by Kelvin Zero's team This documentation provides a step-by-step guide to setting up Single Sign-On (SSO) for Datadog using MPAS. SSO simplifies user authentication by allowing access to multiple ...
Trend Micro - SSO configuration
This documentation has been tested and approved by Kelvin Zero's team This documentation provides a step-by-step guide to setting up Single Sign-On (SSO) for Trend Micro using MPAS. SSO simplifies user authentication by allowing access to multiple ...
Zendesk - SSO configuration
This documentation has been tested and approved by Kelvin Zero's team This documentation provides a step-by-step guide to setting up Single Sign-On (SSO) for Zendesk using MPAS. SSO simplifies user authentication by allowing access to multiple ...