UiPath - SSO configuration

UiPath - SSO configuration

Alert
Please note that this application has not been formally tested by Kelvin Zero Inc. It is provided solely as a reference guide. If you encounter any issues, kindly submit a ticket directly through the support desk.
Quote
This documentation provides a step-by-step guide to setting up Single Sign-On (SSO) for UiPath using MPAS. SSO simplifies user authentication by allowing access to multiple applications with a single set of credentials. This integration enhances security and improves user experience across your organization
Warning
To set up Multi-Pass with  UiPath, ensure you meet the following requirements:
- Administrator access to the UiPath Orchestrator Admin Console (Automation Suite or Automation Cloud).
- UiPath requirement: Studio/Assistant version ≥ 2020.10.3.
- MPAS Admin rights
- Make sure that all users intended to use SSO in UiPath  are registered in your IdP and have the necessary permissions to access UiPath.
Important: Custom elements in URLs (like realm names) are case sensitive. Make sure to match the exact casing from your environment.


UiPath - SSO configuration


Step 1 – Access SSO Settings in UiPath

  1. Log in to the UiPath Orchestrator Admin Console.
  1. Go to Admin, Security
  1. Select Single Sign-On (SSO), Select SAML 2.0 as the authentication method.
  2. Click Configure to open the SAML configuration form.
  1. Copy the metadata form UiPath and paste in another browser, it will automatically download the metadata file that you will provide to Multi-Pass.
  1. Paste MPAS metadata in the field called Metadata URL  and click on Fetch
    1. https://ca.auth.kzero.com/realms/Randintegration/protocol/saml/descriptor
  2. It will automatically complete the fields : 
    1. Sign-On URL
    2. Identity Provider Entity ID
    3. Signing certificate
  1. Click Next
  2. Add the domain that need to be accepted by UiPath and then click on "Test and Save" 
  1. Click on Done



Step 2 – Retrieve Multi-Pass Metadata

  1. Open Multi-Pass Dashboard

  1. Select the appropriate tenant.
  2. Navigate to Integrations, select Applications
  3. Look at custom integrations SAML 
  1. Look at the top righ corner and click on "Upload file" and select the metadata from UiPath, It will automatically complete the fields :
    1. Client ID
    2. Assertion Consumer Service URL
  1. Complete the next fields : 
FieldValue
NameUiPath
DescriptionSSO integration
NameID Policy Formatemail
  1. Click on Add integration
  2. Now we need to make sure all the fields are well completed into the advanced console
  3. On the left side click on "Advanced console"

  1. Click on client, and use the search bar to find UiPath.

General settings
FieldValue
Client IDhttps://cloud.uipath.com/2df4d681-5a8b-41db-aa75-421e8a1461f2/identity_
NameUiPath
DescriptionSSO integration
Always Display in UION

Access settings
SAML capabilities
SettingValue
Name ID Formatemail
Force Name ID FormatON
Force POST BindingON
Include AuthnStatementON

Signature and Encryption
SettingValue
Sign DocumentsON
Sign AssertionsON
  1. Move to the tab "keys" and make sure both parameters are switched to OFF
  2. Move to the tab "Advanced" 
    1. Assertion Consumer Service POST Binding URL = Valid Redirect URIs (ACS) = https://cloud.uipath.com/2df4d681-5a8b-41db-aa75-421e8a1461f2/identity_/Saml2/Acs
  3. Finally go to client scope, and make sure that you add the following attribute : 
    1. given_name → First Name
    2. family_name → Last Name
  1. Select the assigned client scope 
  2. And click on Add mapper, select user attributes and complete the different field the first time for First name and a second time for Last Name.


    • Related Articles

    • SAML SSO Integration Guide

      This guide provides an overview of how to configure SAML Single Sign-On (SSO) between Multi-Pass and a third-party Service Provider (SP). Multi-Pass acts as the Identity Provider (IdP) in this federation model. Multi-Pass is working on SCIM support ...
    • Notion - SSO configuration

      Please note that this application has not been formally tested by Kelvin Zero Inc. It is provided solely as a reference guide. If you encounter any issues, kindly submit a ticket directly through the support desk. This documentation provides a ...
    • Addigy - SSO configuration

      This documentation has been tested and approved by Kelvin Zero's team This documentation provides a step-by-step guide to setting up Single Sign-On (SSO) for Addigy using MPAS. SSO simplifies user authentication by allowing access to multiple ...
    • Kaseya One - SSO configuration

      Please note that this application has not been formally tested by Kelvin Zero Inc. It is provided solely as a reference guide. If you encounter any issues, kindly submit a ticket directly through the support desk. This documentation provides a ...
    • Wrike - SSO configuration

      This documentation has been tested and approved by Kelvin Zero's team This documentation provides a step-by-step guide to setting up Single Sign-On (SSO) for Wrike using MPAS. SSO simplifies user authentication by allowing access to multiple ...