All About SSO (Single Sign On) In Bime [BIME TIP]

In the recently released V3.0, one of the features we introduced to Bime is Single Sign On. Single Sign On (SSO) is a way to authenticate a Bime user based on third party identity providers. The idea is that Bime users don’t have to type their login / password to log in. This can provide enhanced security and central management of identities, making the log in process generally, more convenient and more secure for Bime users.

Bime currently supports 5 identity providers:

  • Google Apps
  • Gmail
  • Twitter
  • OpenID
  • SAML

SSO can be used by creators and architects to access their Bime account in the browser (but not from Bime Desktop) and also, to acccess dashboards.

1- Enabling / disabling SSO

Everything is managed from Admin > Account.

Notes about SAML:

Secure Assertion Markup Language (SAML), allows you to provide Single Sign-on (SSO) for your help desk using enterprise identity types such as Active Directory and LDAP.

Remote login URL: SAML server with provisioned users or connected to identity repository (Active Directory, LDAP, etc.).

Certificate fingerprint: SHA1 fingerprint of the SAML certificate from your SAML server.

2- SSO for dashboards

In the publish pop-up of your dashboard, Protection > Protect with group:

All the SSO options enabled in the admin session are listed.

The “Propose to log with” option will ask the user how they want to login based on the different options provided. The “Automatically log the user with” will use the selected SSO option to log the user transparently. If they have a session on the identity provider, the user won’t even see the sign in with this option.

This was a quick overview detailing the flexibility that the SSO capability in Bime can give you. For more resources, head over to our support page. Want to see something in particular in our 'Bime Tip' series? Let us know in the comments!