Single Sign-On with an IdP

BlueSnap's support for single sign-on (SSO) lets users sign into their BlueSnap accounts with one set of credentials, removing the hassle out of logging in. BlueSnap supports Security Assertion Markup Language (SAML), enabling you to go through your preferred Identity Provider (IdP) to authenticate with BlueSnap. Login security is greatly improved since users don't need to create and store another password, and since you can utilize password policies and two-factor authentication configured through the IdP.

See:

SSO setup with Okta - Classic UI
SSO setup with Okta - Developer Portal
SSO setup with OneLogin

Note: If you'd like to set up SSO with an IdP not covered on this page, please work with your Implementation Specialist or contact Merchant Support.

SSO setup with Okta - Classic UI

Follow the steps below to authenticate with BlueSnap using Okta's Classic UI.

📘

Requirements

You must have an Okta account and your app must be authenticated with Okta before proceeding.

  1. Log in to your Okta account (Classic UI view).

  2. Go to Applications > Applications and click Add Application.

  3. Click Create New App.

  4. Select Web as the Platform and SAML 2.0 as the Sign on method.

  5. Click Create.

  6. Enter a name for the app, such as BlueSnap. Leave the remaining fields as they are and click Next.

  7. Configure the following settings.

SettingDescription
Single Sign On URLEnter https://cp.bluesnap.com/jsp/developer_login.jsp for BlueSnap Production or https://sandbox.bluesnap.com/jsp/developer_login.jsp for BlueSnap Sandbox.
Use this for Recipient URL and Destination URLSelect this checkbox.
Audience URI (SP Entity ID)Enter https://cp.bluesnap.com/jsp/developer_login.jsp for BlueSnap Production or https://sandbox.bluesnap.com/jsp/developer_login.jsp for BlueSnap Sandbox.
Default Relay StateEnter your BlueSnap Merchant ID.
912
  1. Click Next.

  2. Select I'm a software vendor. I'd like to integrate my app with Okta. and click Finish.

  3. Navigate to your newly-added application, click the Sign On tab, and click Identity Provider Metadata. An XML file will be displayed that contains the data you need for the next step.

  4. In this step, you will prepare the following configuration, using the data from the XML file.

referer.hostname = {your data here}
provider = okta
onelogin.saml2.strict = true
onelogin.saml2.debug = false
onelogin.saml2.idp.entityid = {your data here}
onelogin.saml2.idp.single_sign_on_service.url = {your data here}
onelogin.saml2.idp.x509cert = {your data here}
onelogin.saml2.security.nameid_encrypted = false
onelogin.saml2.security.authnrequest_signed = false
onelogin.saml2.security.want_messages_signed = false
onelogin.saml2.security.want_assertions_signed = false
onelogin.saml2.security.want_assertions_encrypted = false
onelogin.saml2.security.want_nameid_encrypted = false
onelogin.saml2.security.want_xml_validation = true

You will need to modify the following on your configuration file.

  • referrer.hostname - Replace {your data here} with your hostname. For example: dev-bls.okta.com.

  • onelogin.saml2.idp.entityid - Replace {your data here} with the value of the entityID attribute in the XML file (shown below).

  • onelogin.saml2.idp.single_sign_on_service.url - Replace {your data here} with the value of the Location attribute of md:SingleSignOnService in the XML file (shown below).

  • onelogin.saml2.idp.x509cert - Replace {your data here} with the value of the ds:X509Certificate element in the XML file (shown below).

1829

Data needed from the XML file

Note: Once you've prepared the configuration, set it aside for now. You will need to provide it to BlueSnap in later steps.

  1. In the General tab, copy the URL provided in the Application Embed Link section. You will need to embed this link in your app so logged-in users can access their BlueSnap account.

  2. Now, assign users to the application so they can have SSO access to their BlueSnap accounts (via the link from the previous step). Click the Assignment tab and complete the steps in the UI.

    Note: In the Username field, make sure to enter their BlueSnap account username.

846
  1. Now, you will need to provide BlueSnap with your Okta configuration. Log in to your BlueSnap account and go to Settings > User Accounts.

  2. In the Okta Integration section, turn on the Enable Okta Classic toggle, and paste your configuration data from step 11.

  3. Click Submit.

Now, when an authenticated user clicks on the embedded link in your app, they will be able to access their BlueSnap account. The first time a user clicks on the link, they will need to log in using their credentials to establish the SSO connection. Further logins will not require the user to enter their credentials.

SSO setup with Okta - Developer Portal

Follow the steps below to authenticate with BlueSnap using Okta's Developer Portal.

📘

Requirements

You must have an Okta account and your app must be authenticated with Okta before proceeding.

  1. Go to https://developer.okta.com/ and log in to your account. Make sure you're viewing your account in the Developer Portal view.

  2. In your account dashboard, take note of the Org URL in the upper right portion of the screen. You will need this value when you configure SSO in your BlueSnap account.

  3. Create a new application for BlueSnap by going to Applications and clicking Add Application.

  4. Select Web as the platform and enter a name for the application, such as BlueSnap.

  5. As you proceed through the app creation process, ensure you configure these settings:

SettingDescription
Allowed Grant TypesIn the Client acting on behalf of a user section, select the Authorization Code checkbox.
Login redirect URIs and
Logout redirect URIs
Enter https://cp.bluesnap.com/jsp/developer_login.jsp for BlueSnap Production or https://sandbox.bluesnap.com/jsp/developer_login.jsp for BlueSnap Sandbox.
Login initiated bySelect App Only.
Initiate Login URIEnter https://cp.bluesnap.com/jsp/developer_login.jsp for BlueSnap Production or https://sandbox.bluesnap.com/jsp/developer_login.jsp for BlueSnap Sandbox.
  1. Finish the app creation process and navigate to the settings page for the app.

  2. In the General tab, note the Client ID and Client Secret in the Client Credentials section. You will need these values to configure SSO in your BlueSnap account.

  3. You will need to assign users to the application so they can have SSO access to their BlueSnap accounts (via the link you copied). Click the Assignment tab and complete the steps in the UI.

  4. Now, you will configure your SSO settings in your BlueSnap account. In your BlueSnap account, go to Settings > User Accounts.

  5. In the Okta Integration section, make sure Enable Okta Login is turned on.

  6. Configure these settings:

  • Okta Domain - Enter your Org URL from Step 2.
  • Okta Client ID - Enter your Client ID from Step 7.
  • Okta Client Secret - Enter your Client Secret from Step 7.
  1. Click Submit.

  2. A URL will be displayed in the Okta Integration section. You can embed the URL in your app so logged-in users can access their BlueSnap accounts.

When a user clicks on the embedded link for the first time, they will need to enter their Okta credentials. This confirms the connection between their account in your app and their BlueSnap account. Future logins will not require the user to enter any credentials.

SSO setup with OneLogin

Follow the steps below to authenticate with BlueSnap using OneLogin.

📘

Requirements

You must have a OneLogin account and your app must be authenticated with OneLogin before proceeding.

  1. Log in to your OneLogin account and go to Applications > Applications > Add App.

  2. In the Find Applications section, search for SAML Test Connector. Select SAML Test Connector (IdP w/ attr w/ sign response) from the search results list.

  3. Enter a Display Name for the app, such as BlueSnap, and click Save.

  4. Click the Configuration tab and configure the following settings:

SettingDescription
AudienceEnter https://sandbox.bluesnap.com/ for Sandbox or https://cp.bluesnap.com/jsp/developer_login.jsp for Production.
ACS (Consumer) URL ValidatorEnter .*
ACS (Consumer) URLEnter https://sandbox.bluesnap.com/jsp/developer_login.jsp?host=bluesnap-dev.onelogin.com for Sandbox or https://cp.bluesnap.com/jsp/developer_login.jsp?host=bluesnap-dev.onelogin.com for Production.
1143
  1. Click Save.

  2. You will need to assign users to the BlueSnap app so they can have SSO access to their BlueSnap accounts. Click the Users tab and complete the steps in the UI.

    Note: You can change a user's login username for the app by clicking the user and modifying the Login field.

A user can access their BlueSnap account by first logging into their OneLogin account and clicking on the BlueSnap app. The first time a user accesses their BlueSnap account, they will be asked to log in using their credentials. Subsequent logins will not require the user to enter their credentials.