Usage Rules
Usage Rules are an optional feature to limit the scope of the connection. If Usage Rules are disabled all users will use the connection. The most common use cases are testing and user routing if you utilize more than one connection.
Please review the testing section later in this document for information on how usage rules can assist with testing a new connection.
- Select Enable Usage Rules option to create specific rules to restrict which users will utilize this SSO connection.
- Set rules based on specific Users or entire Email Domains (e.g., “verifydemo.com”). Currently there is a limit of 12 total usage rules.
- Usage rules are prioritized, individual email matches take precedence over email domain matches.
Persona Mapping
For more information, see persona .
Select Enable Persona Mapping option to configure user's persona in the application based on their SSO attributes.
- Define the incoming persona attribute from the IDP that indicates the persona (e.g., role, department, job title).
- Choose Default Persona from dropdown to set default persona for users who do not have specific attributes .
- Select Next button.
If you are using either Microsoft ADFS or Azure AD/Entra ID and intending to make use of their standard attributes, please refer to the following table to identify the Standard attribute names to be used with the Persona attribute field above. Use of the Azure SAML or ADFS SAML attribute names will result in an error:
| Standard attribute name | Azure SAML assertion attribute name | ADFS SAML assertion attribute name |
|---|---|---|
| groupIds | http://schemas.microsoft.com /ws/2008/06/identity/claims/role |
http://schemas.xmlsoap.org/claims/Group |
| department | department | department |
| job_title | job_title | job_title |
Finalizing the Configuration
- Ensure all settings are correct and complete.
- Select Confirm button to finalize the setup. You will receive a
confirmation that the connection has been saved.
Managing SSO Connections
- To modify an existing SSO connection, open the connection from the SSO connections table and
select
icon in the upper
right and then select Edit
- You can disable any connection from the management interface to stop its usage without deleting it.
You can disable any connection from the management interface to stop its usage without deleting it.
Post Configuration Tasks
Those who have existing Legacy connections should disable them within 30 days after new connections have been set up to authenticate all users and are fully tested and operational.
Legacy connections will remain enabled for up to 30 days after all users have been configured to use non-Legacy connections, after which they may be administratively disabled. Legacy connections can be identified by the Connection Type 'LEGACY' on the Domain Management page as shown below.
Troubleshooting Common Issues
- Ensure you have provided correct Client ID, Secret, and metadata settings.
- Ensure the attributes being passed from the IDP match the expected values in Apptio.
- Verify that role names from the IDP match those configured in the application.
- The following errors may result from xml metadata not being encoded as UTF-8.
- Invalid request : Failed to import metadata. The metadata input has a syntax error.
- invalid character
Note: it is common for metadata saved using a browser file operation to be encoded with UTF-8 BOM which is not compatible and would need to be converted to UTF-8 before uploading into Domain Management.