SAML
Nozomi Networks supports security assertion markup language (SAML) single sign-on (SSO) authentication.

General
Your identity provider (IdP) must be compatible with security assertion markup language (SAML) 2.0.
Additional configuration
Typically, SAML with authentication, replies are sent back from the same host that originally received the request. Occasionally, SAML requests are chained between different IdPs, and replies might come from a different host. By default, the Web user interface (UI) content security rules block these types of replies.
You can use the csp form-action-urls configuration key to override
this behavior.
To accept replies from an IdP
single sign-on (SSO) target uniform resource locator (URL) that
differs from the one specified in the SAML metadata,
you can issue the configuration rule: conf.user configure csp
form-action-urls <additional_url> in the command-line interface (CLI).
If you need to specify more than one URL, you should use
spaces to separate them. After this change, you need to run the service
webserver stop command, in a shell console to apply it.
Clock skew
Occasionally, the IdP and CMC system
times can differ. By default, the system accepts requests with up to 60 seconds
difference. You can use the saml clock_drift configuration key to
override this behavior.
To change the value, you can issue conf.user configure saml clock_drift
<allowed_seconds> in the CLI.
After this change, you can run the service webserver stop command in
a shell console to apply it.
Limitations
The SAML logout protocol is not supported.