Hudu - SSO configuration

Hudu - SSO configuration

Idea
This documentation has been tested and approved by Kelvin Zero's team
Quote
This documentation provides a step-by-step guide to setting up Single Sign-On (SSO) for Hudu using MPAS. SSO simplifies user authentication by allowing access to multiple applications with a single set of credentials. This integration enhances security and improves user experience across your organization.
Warning
To set up Multi-Pass with Hudu, ensure you meet the following requirements:
- Hudu admin rights
- MPAS Admin rights
- Make sure that all users intended to use SSO in Hudu are registered in your IdP and have the necessary permissions to access Hudu.
Important: Custom elements in URLs (like realm names) are case sensitive. Make sure to match the exact casing from your environment.

Hudu - SSO configuration


Activate SAML in Hudu

  1. Log in to your Hudu dashboard.
  2. In the top-right menu, click on Admin.

  1. From the Admin panel, select the Security tab.
  2. In the Authentication section at the top of the page, click on Configure next to SAML / SSO.

  1. You’ll arrive on the Enable Single Sign-On page.
    1. Toggle the switch to ON to activate SAML SSO.
    2. Below, you'll see configuration fields appear.You can optionally consult Hudu's official documentation by clicking Generic Provider.



Hudu Fields to Fill

FieldDescription
SAML Issuer URLProvided by Multi-Pass
SAML Login EndpointProvided by Multi-Pass
SAML Logout EndpointProvided by Multi-Pass
SAML FingerprintCertificate fingerprint from Multi-Pass (SHA-256)
SAML CertificatePublic certificate from Multi-Pass
SAML ARNOptional, leave empty if not needed
Exempt from SSOAdd users to bypass SSO (e.g., breakglass account)

The information required above will be mentioned later in the documentation.

Configure Multi-Pass

  1. Go to Open Multi-Pass Deployment Dashboard
  2. Authenticate and select your deployment.

  1. Click on Integration > Applications, and locate the shortcut for Hudu.
  2. For a complete setup, click on Advanced Console in the left-hand menu.

  1. In the Advanced Console, click on Clients > Create Client.

  1. Fill in the following fields:
FieldValue
Client TypeSAML
Client IDHudu domain (e.g., https://docs.mywebsite.com)
Namehudu (or any name of your choice)
Descriptione.g., SSO Integration
Always display in UION

  1. Click Next
  2. Make sure to complete the next fields correctly : 


  1. Click on Save, you will be redirected on a new page with several tabs and fields.
  2. In the Settings tab, scroll to SAML Capabilities and configure:
SettingValue
Name ID Formatemail
Force POST BindingON
Include AuthnStatementON
Other SAML optionsOFF
  1. In the Signature and Encryption section:
    1. Sign Documents: ON
  2. Click Save.
  3. In the Keys tab : 
    1. Client Signature Required: OFF (both toggles should be OFF)
  4. Move to the Advanced Tab and complete the following field:
    1. Assertion Consumer Service POST Binding URL: https://docs.mywebsite.com/saml/consume
  5. Click Save again.

Get Metadata and Certificate from Multi-Pass

  1. In the left-side menu, click Realm Settings.

  1. Go to the Keys tab.
  2. Locate the RS256 line and click Certificate.
  3. A modal will open. Copy the certificate.
  4. Optionally, compute its SHA-256 fingerprint if required by Hudu.

Finalize Configuration in Hudu

  1. Return to your Hudu SAML configuration page, and fill in the following:
FieldValue
SAML Issuer URLhttps://ca.auth.kzero.com/realms/<TENANT_NAME>
SAML Login Endpointhttps://ca.auth.kzero.com/realms/<TENANT_NAME>/protocol/saml
SAML Logout Endpointhttps://ca.auth.kzero.com/realms/<TENANT_NAME>/protocol/saml
SAML FingerprintSHA-256 fingerprint from the Multi-Pass certificate
SAML CertificateThe full X.509 certificate from MPAS, wrapped in:
-----BEGIN CERTIFICATE-----
[certificate]
-----END CERTIFICATE-----


  1. Click Save to apply the configuration.

Test the Passwordless Login

  1. Log out of your Hudu session.
  2. Go to your Hudu domain (e.g., https://docs.mywebsite.com).
  3. Try logging in via SSO — you should be redirected to Multi-Pass and receive a passwordless push notification.

    • Related Articles

    • SAML SSO Integration Guide

      This guide provides an overview of how to configure SAML Single Sign-On (SSO) between Multi-Pass and a third-party Service Provider (SP). Multi-Pass acts as the Identity Provider (IdP) in this federation model. Multi-Pass is working on SCIM support ...
    • HaloPSA - SSO configuration

      This documentation has been tested and approved by Kelvin Zero's team This documentation provides a step-by-step guide to setting up Single Sign-On (SSO) for HaloPSA using MPAS. SSO simplifies user authentication by allowing access to multiple ...
    • Auvik - SSO configuration

      This documentation has been tested and approved by Kelvin Zero's team This documentation provides a step-by-step guide to setting up Single Sign-On (SSO) for Auvik using MPAS. SSO simplifies user authentication by allowing access to multiple ...
    • Huntress - SSO configuration

      This documentation has been tested and approved by Kelvin Zero's team This documentation provides a step-by-step guide to setting up Single Sign-On (SSO) for Huntress using MPAS. SSO simplifies user authentication by allowing access to multiple ...
    • Addigy - SSO configuration

      This documentation has been tested and approved by Kelvin Zero's team This documentation provides a step-by-step guide to setting up Single Sign-On (SSO) for Addigy using MPAS. SSO simplifies user authentication by allowing access to multiple ...