Configure SAML Authentication

You can configure Meridian Explorer to work with any SAML 2.0 compatible identity provider. For information about configuring PowerWeb and site cache connections to use SAML, see the Configure WebLink Registry Keys section below.

To use SAML authentication in Meridian, a Meridian Portal tenancy is required. You can Configure a Third-Party Identity Provider in Meridian Portal.

To complete this configuration, as a Meridian Enterprise Server System Administrator you must understand how to configure an on-premises firewall to allow inbound connections if required.

To configure Meridian Explorer for SAML authentication, complete these tasks on the Meridian Enterprise Server computer. Command lines are shown below but, you can also complete the tasks with the user interface.

Due to the technical complexity and impact on user management processes, we recommend you contact your Accruent account manager when you intend to implement SAML authentication for an on-premises Meridian installation.

SAML authentication currently does not work with:

  • PowerUser

  • Selecting Publisher rendering jobs

Important!

When presenting the e-signature page, Meridian instructs the identity provider to force re-authentication of the user. However, by itself this may not meet regulatory requirements because the browser may be caching credentials. Additional measures such as defining security policies to prevent credential caching by browsers may be required. It also may depend on how the selected identity provider behaves when forcing re-authentication.

OpenID Connect is used to communicate between Meridian Server on-prem and your Meridian Cloud tenancy, where the integration with the SAML identity provider is configured. The instructions below describe how to configure OpenID Connect to connect from the Enterprise Server to your Meridian Cloud tenancy.

The configuration can be set up and tested with the tool described in Configure OpenId Connect.