From the audit log to branding options and security preferences, Account Settings is where you will find the information that will help you choose options that are the best fit for your needs.
Accessible through Settings, the Audit Log shows a full history of user activities on the Infobip web interface and allows for faster issues resolution. This industry standard comes in handy when you need to troubleshoot or investigate an event. Events are grouped by Account, Username, IP Address, and Description, and they can be filtered by range (last 15 minutes, today, yesterday, this week, etc.), specific date and time.
The benefits of Audit Log:
- Full transparency on what has happened on the account and when.
- The basis for an even more proactive approach to anomalies related to actions on your account, with an aim to prevent hacking.
- Perform the events auditing on your own, without having to reach out to the Infobip Support.
This feature will be available for all users with the Account Manager role. If a user does not see the Audit Log, they can contact their Account Manager.
The Branding Settings are your path to a customized account - both on the inside and on the outside.
Go to Settings > MY ACCOUNT > Edit Account > Customize. Once you land there, check out the How to set-up custom URL, logo, and theme tutorial for more help with customization.
If you only want to customize your account (not the login page), then set the theme, language, and logo to make the account fit your corporate visual identity.
If you would like to go for both the login page and account customization, you will need to set the hostname URL and logo. The hostname will be used as a web interface URL for your account.
Your logo will appear on the login page when you are using the custom login page URL.
We believe security should be everyone`s priority! Needless to say, we have put a lot of thought into Security Settings.
The Security Settings were created to manage the security levels for account access, and they involve several features.
1. User Password Policies
The first feature, User Password Policies (below), is where you have an opportunity to define the user activity details and password security values for your account.
2. Two Factor Authentication
The second security feature, two-factor authentication (2FA), can be enabled at once for all the account users. As a result, the users will have to enter the verification code when logging in. They can choose between two login functionalities - Remember or On each login.
Remember is for user devices that have been verified. Once the device has been verified, the user will not be required to go through the identity verification process on the same device.
On each login means that the user will be required to go through the 2FA process every time they want to log in to the web interface.
3. API Keys
API Keys page offers a quick way to create an API key through UI and start developing without delay.
The types of permissions you can select when creating an API key:
PUBLIC API. Provides access to all API calls.
2FA. Access only to 2FA methods.
WEB SDK. Access to Web JS SDK to work with People.
Configure Single Sign-On (SSO)
Single Sign-On (SSO) is an authentication process where a single set of credentials can be used to log into different applications. Infobip supports SSO integration for any Identity Provider that is based on the SAML 2.0 protocol.
SAML 2.0, released in 2005, remains the most used in Enterprise SSO space. Now, here's a quick introduction to how it works and how it can be configured on the Infobip web interface.
SAML supports two different types of flows:
- those initiated by the Service Provider
- those initiated by the Identity Provider
In this article, we cover the common SP-initiated flow. That's the one we use.
On the Identity Provider side, only System Admins can configure the SSO settings for their company.
On the Infobip web interface side, only a user with an Account Manager business role can define and modify the SSO configuration.
Your Identity Provider must be based on the SAML 2.0 protocol.
All users of an SSO-enabled account on the web interface must authenticate through an Identity Provider.
How To Enable SSO
Before you begin, it's important to know that the SSO configuration is completely self-servable and requires no additional data to be generated from the Service Provider, Infobip. Everything you need will be provided during the SSO configuration process.
Identity Providers all have their unique methods of configuration. However, the following minimal set of configurations is needed for the Identity Provider to work with a Service Provider (Infobip):
- Log in to the Infobip web interface and go to Settings > MY ACCOUNT. Click Configure SSO. You will be redirected to a dedicated page where you configure the SSO.
- Fill out the following fields related to your Identity Provider.
- IdP Identifier – A system entity or issuer that creates, maintains, and manages identity information for principals.
- IdP Signature Certificate – The certificate from the Identity Provider used to sign the SAML assertion.
- IdP Single Sign-On URL – SAML 2.0 endpoint (HTTP) which represents the sign-on URL from the Identity Provider.
- Configure the following fields and use them for the SSO configuration on your Identity Provider:
- SP Entity ID – URL or other identifier that is given by the Service Provider that uniquely identifies it. Use this URL to initiate the SSO login process and share it with all users in your account.
- SP Assertion Consumer URL – URL where a user will be redirected to after a successful authentication request. Use this URL to configure where the IdP sends SAML assertions. The URL is generated randomly when you enter the SP Entity ID.
- Logout URL – The URL on your Identity Provider where all users will be redirected to, after a successful logout on the Service Provider side. Your users will be redirected to the specified Logout URL to terminate the session on your Identity Provider.
- Auto-create Users – When this option is turned on, upon accessing the SP Entity ID and during the logon process, all your users who try to access that URL, (the ones successfully authenticated on your Identity Provider) will be created automatically in our system with their basic details.
- Auto-create Groups – When this option is turned on, upon accessing the SP Entity ID and during every user logon process, all groups and user memberships will synchronize with your Identity Provider. By enabling this option, all previously created Teams, their roles / permissions and user memberships will be permanently deleted. You will only be able to use the Teams that are automatically created through the Single Sign-On group sync.
This option requires additional configuration on your Identity Provider to work properly. Learn more.
Make sure you define the format of the Name Identifier (NameID) on your IdP as it specifies the identity of the authenticated user. Supported Name Identifier formats are email address and username.
- As soon as you click ACTIVATE, your SSO configuration will be saved, and you will be in the dual login mode. This means that both the standard web interface login with username and password and the Single Sign-On login will work in parallel.
If you at any time decide to DELETE an existing SSO configuration, your login type will be switched back to the standard web interface login with username and password and you might be logged out.
Under MY ACCOUNT, within the Single Sign-On (SSO) section, you will also find the SSO toggle button on the right side. By switching this toggle to ON, you are switching from the dual login type to the Single Sign-On login type only, where user authentication is handled on your Identity Provider.
SSO using SAML over the Web Interface
- For your login process, you will need to always use the SP Entity ID, which was generated for you, since it represents a unique access URL to the Infobip web interface, e.g., https://portal.infobip.com/login/saml/contoso/.
- To enable the login process, first, choose whether you want to have the Auto-create Users option turned on for your account or you want to create all users manually.
- Option A - Have users created automatically. As soon as you turn on the Auto-create Users option, upon accessing the SP Entity ID and during the logon process, all your users who try to access that URL, i.e., who are successfully authenticated on your Identity Provider, will be created automatically in our system. We will create all users from the details received within the SAML response from your Identity Provider, such as First name, Last name, Identity (which can be defined as an email address or username), and other relevant data.
- Option B - Create users manually. You have to create all users with exactly the same details regarding their identity that will also come through the SAML response from your Identity Provider.
If you have the Auto-create Users option turned on, here's what will happen when your users start to connect to the Web Interface:
- Existing user accounts – If they do not use the same Name Identifier data (the same username or email, that are being received within the SAML response) all users who try to logon, they will be created as new users.
- New user accounts – As soon as your users access a dedicated link for the SSO login, they'll be created on our side, with the identity data that is being received within the SAML response and their session will be started inside the web interface.
3. When you have the SSO configuration defined and ready, your login process will always be the same:
- Step 1 – A user accesses their SP Entity ID, i.e., a unique access URL, Infobip’s Web Interface then redirects them to their Identity Provider, to allow them to authenticate and log on to their home company, using their domain credentials.
- Step 2 – If the log on attempt was successful, your company's service will push the login details back to the web interface using HTTP POST with SAML payload in its body. This is usually a Base64 encoded XML payload which contains details about a user who had just logged in.
- Step 3 – At that moment, the web interface will have all the details about the user's profile saved to the session and will allow this user to access Infobip products and services. The login process is then completed, and the user's details are available from their session.
Extending the SAML response on your Identity Provider
Infobip provides limited support for additional SSO requirements as other authentication scenarios present a potential security risk to companies.
Our clients can extend the SAML response sent from their Identity Provider back to the web interface to contain an additional attribute, such as Group Membership values from the Identity Provider. Some of the Identity Providers (e.g., MS Active Directory) allow the definition of attribute mapping rules, based on Group Membership. By defining these extended attributes, our clients can provide us with a list of groups in addition to the user properties in the SAML response.
If you want the Group Membership information to be sent within the SAML request, you will need to perform the following:
- Extend the SAML response, which is being sent from your Identity Provider, with a new attribute statement that lists all Group Memberships for a user. Make sure that the claim attribute name is defined as follows: http://schemas.xmlsoap.org/claims/Group.
- Make sure that the Group Membership values are forwarded containing the
Name as identity since we want to map the Group Names, not other group identifiers like SID.
This additional attribute claim should look like the following:
- Make sure you have turned on the Auto-create Groups option in Settings > MY ACCOUNT > Configure SSO, so that the newly added attribute can be properly handled upon each user logon.
How this is reflected on the web interface:
- You don't need to have the Groups created in advance. We will perform that automatically. When a user tries to log in, the Group attribute will be sent back to us every time with the rest of the SAML data.
- The web interface will then map these Groups with the Teams in our system. If a certain Group is not on the Teams list, we will create it with the same Group Name as defined on your Identity Provider.
- Groups will be matched and compared to each user login. This is done for all users. We will verify and update the membership on our side, based on the Groups provided inside the SAML response.
- Group creation, mapping to Teams, and user membership assignment are resolved automatically. Roles and permissions management needs to be performed manually and for all Teams, through the web interface.
Multiple Accounts or Sub-accounts Access
To use a unified configuration for multiple sub-accounts, contact our Support team.