Identity Providers

Prev Next

Identity providers (IDP’s) are used to supply user identification to other applications in a single sign on (SSO) way.
For example, if a user is authenticated to the Application Workspace, and the user visits a website that is federated with the Application Workspace IDP, then the user doesn’t have to authenticate again to the website, as the website can ask the Application Workspace IDP who the user is. The user will be granted access to the website with SSO which will provide the best end user experience.

Identity providers list

This list displays all identity providers currently available in the Application Workspace System.

Selecting multiple rows from the table

  • To select multiple adjacent rows, click on the first row, then hold down the Shift key and click on the last row in the range; all rows between will be selected.
  • To select multiple non-adjacent rows, hold down the Ctrl key (or "Command" on Mac) and click on each row you want to select individually.
  • To select multiple adjacent rows using the mouse only, click and hold the left mouse button on the first row, then drag the cursor up or down across the rows to highlight the desired ones.
  • Selecting rows using only the keyboard is not possible.

Table toolbar

To create a new identity provider, click on the AW43_enlarge Create button; to view the details of an identity provider or edit it, double-click its entry or select the identity provider and click the AW43_edit.png Edit button.

AW43_views.png Views gives you control on how the table is displayed.
The default view contains all your identity providers in alphabetic ascending order, and only a few columns: Name, Type and Enabled.
You can create your own personalized view of the table, by filtering the identity providers or adding/deleting columns and clicking Save as in the drop-down menu of views.png Views.

Further reading

See in the following articles the description of each screen in the detailed view of an identity provider, and what actions you can perform in each of them.

SAML 2.0
OAuth 2.0