UGC Techdocs
Ask or search…
K

Single Sign On (SSO)

Overview

Nosto's UGC supports Secure Assertion Markup Language (SAML), which allows you to provide single sign-on (SSO) for your Nosto's UGC account using enterprise identity providers such as Active Directory and LDAP.
By using SAML, a user is automatically verified with the identity provider when they sign in. The user can then access the Nosto Platform without being prompted to enter separate login credentials.
Key benefits of Nosto's UGC SSO offering include:
  • Clients can enforce their respective password standards
  • Access to Nosto's UGC is routed through the client's Identity Provider (IdP)
  • Clients can revoke access to any system, including Nosto's UGC, by locking the account and/or changing the password
  • Clients can implement their own Two-Factor Authentication (2FA) or Multi-Factor Authentication (MFA) standards
  • End Users can leverage the same credentials they use for other systems
  • Clients can implement their policies around Password resets
  • Staff are discouraged from sharing their accounts

Configuration Details

  • Protocol: SAML 2.0
  • Relying Party Name: Stackla
  • Supported SAML Profiles: IdP Initiated SSO
  • Claim Type: NameIDPolicy: urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress
  • Hash Algorithm: SHA-256
  • Supported SAML Profiles: SP-Initiated SSO
  • Issuance Authorization Rules: Permit All Users

Instructions

Nosto's UGC Single Sign On (SSO) offering is designed to work with organizations own Identity Provider services, such as Active Directory and LDAP, as well as online SAML services, such as Okta, Google, and SalesForce.
Setup guides for the service are available below.