Signiant media shuttle new portal tutorial
![signiant media shuttle new portal tutorial signiant media shuttle new portal tutorial](https://soundandpicture.com/wp-content/uploads/2020/12/ENVY_REMOTE_STANDALONE_BLK_ON_WHITE_v001-1078x208.jpg)
If the portal is enabled for SAML authentication only, the user will be redirected to the SAML identity provider. If the portal is configured for both Media Shuttle native authentication, and SAML authentication, then the user can log in with their email address and password. Note: If the user already has a valid Single Sign-On authentication token, then the login process is bypassed, and the user is taken directly into the portal. In the Media Shuttle case, the assertion of interest is the users email address.ĮndUserExperienceWhen logging in to a Media Shuttle portal with SAML authentication, users may either enter their email address, or click the Corporate Single Sign On link at the bottom to be forwarded directly to the SAML Identity Provider. The Service Provider makes a request to the Identity Provider, and the Identity Provider returns a response which includes assertions, or claims concerning the identity of the person who successfully authenticated. In SAML terms, Media Shuttle is known as the Service Provider (SP) or Relaying Party, and the SAML authentication service is known as the Identity Provider (IdP) or Claims Provider. When portals have both Media Shuttle native authentication and SAML authentication enabled, specific email domains may be configured such that corporate users will only be permitted to authenticate via the SAML corporate directory. This enables multiple portals within a single account to use SAML authentication without per portal Identity Provider configuration. The user is tied to Media Shuttle by the email address returned by the Identity Provider.Ī single trust relationship is established between a given Media Shuttle account and an Identity Provider. After successfully authenticating, the user is directed back to the Media Shuttle portal.
![signiant media shuttle new portal tutorial signiant media shuttle new portal tutorial](https://help.backblaze.com/hc/article_attachments/1260800327429/image-3.png)
With SAML authentication, the user is redirected to the Identity Provider for authentication.
![signiant media shuttle new portal tutorial signiant media shuttle new portal tutorial](https://www.thebroadcastbridge.com/cache/uploads/content_images/Signiant_Media_SHuttle_SaaS_789_344_70_s.jpg)
#SIGNIANT MEDIA SHUTTLE NEW PORTAL TUTORIAL PASSWORD#
This password is managed by the user and is the same for all Media Shuttle portals, regardless of their ownership.
![signiant media shuttle new portal tutorial signiant media shuttle new portal tutorial](https://www.thebroadcastbridge.com/cache/uploads/content_images/Signiant-Media_Shuttle_Admin_Dashboard._789_563_70_s.jpg)
Media Shuttle native authentication requires the users email address and password. Media Shuttle provides two configuration options: You can create a single SAML configuration for all portals, or configure per-portal authentication policies to segment access to your Media Shuttle portal. Simplify onboarding SAML authentication allows you to automatically add new members to Media Shuttle. Automate expiry of credentials - When you remove a portal member from your directory service, they immediately lose access to Media Shuttle. Reduce risk regarding passwords in SaaS products No passwords are not stored by Media Shuttle. Improve password policy enforcement - You can maintain and set your own password policies. Media Shuttles SAML support allows you to: Either of these mechanisms can be configured to operate on any given portal, or be combined on the same portal. Media Shuttle supports both native authentication and SAML (Security Assertion Markup Language) 2.0 Web Browser Single Sign-On form-based authentication. OverviewMedia Shuttle supports SAML authentication allowing you to authenticate your users with your own directory services, such as Active Directory, LDAP and Identity as a Service (IaaS) providers like Okta, OneLogin, Centrify, and Azure Active Directory B2C. 12Įrror Saving Identity Provider Metadata Configuration.