Kaseya One - SSO configuration

Kaseya One - SSO configuration

Alert
Please note that this application has not been formally tested by Kelvin Zero Inc. It is provided solely as a reference guide. If you encounter any issues, kindly submit a ticket directly through the support desk.
Quote
This documentation provides a step-by-step guide to setting up Single Sign-On (SSO) for Kaseya One using MPAS. SSO simplifies user authentication by allowing access to multiple applications with a single set of credentials. This integration enhances security and improves user experience across your organization
Warning
To set up Multi-Pass with  Kaseya One, ensure you meet the following requirements:
-  Kaseya One admin rights
- MPAS Admin rights
- Make sure that all users intended to use SSO in Kaseya One are registered in your IdP and have the necessary permissions to access Kaseya One.
Important: Custom elements in URLs (like realm names) are case sensitive. Make sure to match the exact casing from your environment.


KaseyaOne - SSO configuration



Step 1 - Access the SSO Settings in KaseyaOne

  1. Log in to your KaseyaOne Admin Dashboard.
  2. Navigate to Admin Settings > Single Sign-On tab.
  3. In the Single Sign-On with Identity Providers section, click Edit configuration.
  4. The "Configure SSO" side drawer will appear.

 Step 2 - Provide and gather the required values from Multi-Pass

  1. Open Multi-Pass Dashboard

  1. Select the correct tenant.
  2. Click on integration

  1. Click on application and select the box SAML to start the configuration

  1. then complete the different field with information from Kaseya's
FieldValue
Client ID (Entity ID)https://one.kaseya.com
NameFor example Kaseya
DescriptionSSO integration
Assertion Consumer Service URLhttps://api-one.kaseya.com/api/v1/sso/saml-callback
NameID Policy FormatEmail


  1. Scroll down and click on Add integration. 
  2. Go the advanced console by clicking on the left side. 

  1. Click on client,
  2. and use the search bar to find the integration you add from the previous steps

  1. when you are in, make sure all the fields are correctly completed.
  2. In the settings tab : 
FieldValue
Client IDhttps://one.kaseya.com
Namekaseyaone
DescriptionKaseya One Integration
Always Display in UION
  1. in the access settings section : 
FieldValue
Home URLhttps://ca.auth.kzero.com/realms/<TENANT_NAME>/protocol/saml/clients/<APP_NAME>
Valid Redirect URIshttps://api-one.kaseya.com/api/v1/sso/saml-callback
IDP-Initiated SSO URL Name<APP_NAME>
  1. Move to the SAML Capabilities section : 
SettingValue
Name ID Formatemail
Force Name ID FormatON
Force POST BindingON
Force Artifact BindingOFF
Include AuthnStatementON
Include OneTimeUse ConditionOFF
Optimize REDIRECT Signing Key LookupOFF
Allow ECP FlowOFF
  1. in the Signature and Encryption section : 
SettingValue
Sign DocumentsON
Sign AssertionsON
  1. then move to the tab Keys and make sure that both parameters are switch to OFF
  2. Click on the advanced tab
    1. Assertion Consumer Service POST Binding URL  = Valid Redirect URIs (https://api-one.kaseya.com/api/v1/sso/saml-callback)

Step 3 - Adding the attributes to MPAS

  1. Now click on the tab client scope to start adding the attributes required by KaseyaOne.
  2. Click on the line related to KaseyaOne and we will need to add the list we can find in Kaseya's documentation : 
    1. email
    2. firstname
    3. lastname
    4. username
    5. companyIdentifier

  1. For the companyIdentifier : 
  2. Click on configure a new mapper

  1. select the "hardcoded attribute" from the list

  1. Complete the fields : 
FieldValue
Mapper TypeHardcoded Attribute
NamecompanyIdentifier
Friendly NamecompanyIdentifier
SAML Attribute NamecompanyIdentifier
SAML Attribute NameFormatBasic
Attribute ValueAdd the value provided by KaseyaOne
  1. Click Save

  1. Now, we will add the next attributes, click on add mapper and by configuration

  1. select in the list "User Attribute"
  2. Complete the different fields for each attribute :
    1. email 
FieldValue
Mapper TypeUser Attribute
Nameemail
User Attributeemail
Friendly Nameemail
SAML Attribute Nameemail
SAML Attribute NameFormatBasic
Aggregate Attribute ValuesOFF
  1. Click Save
  2. Repeat the same operation with the others user attribute : 
    1. firstname
FieldValue
Mapper TypeUser Attribute
Namefirstname
User AttributefirstName
Friendly Namefirstname
SAML Attribute Namefirstname
SAML Attribute NameFormatBasic
Aggregate Attribute ValuesOFF
    1. Lastname
FieldValue
Mapper TypeUser Attribute
Namelastname
User AttributelastName
Friendly Namelastname
SAML Attribute Namelastname
SAML Attribute NameFormatBasic
Aggregate Attribute ValuesOFF
    1. Username
FieldValue
Mapper TypeUser Attribute
Nameusername
User Attributeemail
Friendly Nameusername
SAML Attribute Nameusername
SAML Attribute NameFormatBasic
Aggregate Attribute ValuesOFF


Step 4 - go back to KaseyaOne and finalise the configuration

  1. Complete the different field and upload the certificate that you can find on your dashboard > Integration > Application
FieldValue
Identity Provider Single Sign-On URLhttps://ca.auth.kzero.com/realms/<TENANT_NAME>/protocol/saml
Provider Entity IDhttps://ca.auth.kzero.com/realms/<TENANT_NAME>
Identity Provider Issuerhttps://ca.auth.kzero.com/realms/<TENANT_NAME>
CertificateUpload your x.509 certificate




    • Related Articles

    • SAML SSO Integration Guide

      This guide provides an overview of how to configure SAML Single Sign-On (SSO) between Multi-Pass and a third-party Service Provider (SP). Multi-Pass acts as the Identity Provider (IdP) in this federation model. Multi-Pass is working on SCIM support ...
    • Zoho One - SSO configuration

      This documentation has been tested and approved by Kelvin Zero's team This documentation provides a step-by-step guide to setting up Single Sign-On (SSO) for Zoho One using MPAS. SSO simplifies user authentication by allowing access to multiple ...
    • Notion - SSO configuration

      Please note that this application has not been formally tested by Kelvin Zero Inc. It is provided solely as a reference guide. If you encounter any issues, kindly submit a ticket directly through the support desk. This documentation provides a ...
    • Addigy - SSO configuration

      This documentation has been tested and approved by Kelvin Zero's team This documentation provides a step-by-step guide to setting up Single Sign-On (SSO) for Addigy using MPAS. SSO simplifies user authentication by allowing access to multiple ...
    • ConnectWise - SSO configuration

      This documentation has been tested and approved by Kelvin Zero's team This documentation provides a step-by-step guide to setting up Single Sign-On (SSO) for ConnectWise using MPAS. SSO simplifies user authentication by allowing access to multiple ...