Enable IdP-Initiated Single Sign On (SAP Data Center Only)

By default, IdP-initiated SSO is not supported if SAP Analytics Cloud is running on a SAP Data Center. To support IdP initiated SSO on a SAP Data Center, you must add a new assertion consumer service endpoint to your identity provider.

Prerequisites

SAP Analytics Cloud can be hosted either on SAP data centers or on non-SAP data centers. Determine which environment SAP Analytics Cloud is hosted in by inspecting your SAP Analytics Cloud URL:
  • A single-digit number, for example us1 or jp1, indicates an SAP data center.

  • A two-digit number, for example eu10 or us30, indicates a non-SAP data center.

Procedure

  1. Navigate to your IdP and find the page where you configure SAML 2.0 Single Sign On.
  2. Find and copy your FQDN.

    For example, mysystem.wdf.sap-ag.de

  3. Add a new assertion consumer service (ACS) endpoint that follows this pattern:
    https:// <FQDN>/

    For example, https://mysystem.wdf.sap-ag.de/

  4. If you are using SAP Cloud Platform Identity Authentication Service as your identity provider, the link to log onto SAP Analytics Cloud through your identity provider will follow this pattern:
    https://<tenant_ID>.accounts.ondemand.com/saml2/idp/sso?sp=<sp_name>&index=<index_number>

    For example, https://testsystem.accounts999.ondemand.com/saml2/idp/sso?sp=mysystem.wdf.sap-ag.de.cloud&index=1

    Note

    The pattern will vary depending on the identity provider you use.

    The following table lists the URL parameters you can use for IdP-initiated SSO.
    Parameter Mandatory Description
    sp Yes
    • This is the name of the SAML 2 service provider for which SSO is performed.

    • The sp_name value of the parameter equals the Entity ID of the service provider.

    • This parameter is needed for Identity Authentication to know which service provider to redirect the user to after successful authentication.

    index
    Note

    You can choose by the index the correct ACS endpoint for unsolicited SAML response processing. Provide the index parameter when the default ACS endpoint that has been configured via the administration console cannot process unsolicited SAML responses.

    • Enter the index number of the endpoint of the assertion consumer service of the service provider as the target of the SAML response. Otherwise, the identity provider uses the default endpoint configured for the trusted service provider.

    • If your IdP doesn't support indexing, you must choose between IdP-initiated SSO or SP-initiated SSO. You can either replace the default ACS endpoint to initiate an IdP SSO or continue using the default endpoint to initiate an SP SSO.

    • A non-digit value or a value for an index entry that is not configured returns an error message.

Results

Users will be able to use SAML SSO to log onto SAP Analytics Cloud through their identity provider.