SAS Customer Intelligence 360 now supports federated single sign-on (SSO), which enables users to sign in to the application by using their corporate login credentials.
With federated authentication, you can:
In most cases, SSO is implemented across all SAS resources. This is the preferred experience, so each user has one identity for all interactions with SAS websites and applications.
When SSO is set up, you may have to reconfigure some of your SAS applications. For example, external applications that connect to SAS Customer Intelligence 360 must authenticate users through the REST API. For more information, see External API Users in the SAS Customer Intelligence User’s Guide.
A SAS representative will review these changes as you configure the federation process.
To request SSO for your SAS applications, SAS IT requires information about your organization and how you use your SAS applications.
Prepare to start the SSO process by completing the following steps:
Provide the contact information for this technical lead when you complete the SSO request form.
Note: The preferred integration type is SAML, and the preferred method of federation is to use home-realm discovery (HRD). To ensure end-to-end security, your IDP must use encryption.
After you have all the necessary information, you can complete the SSO request form here:
https://support.sas.com/en/forms/federated-single-sign-on-request-form.html
A representative from SAS will review your form and contact your technical lead to begin the SSO process.
Hi,
I am understanding this as that the authentication part for login is now separated from SAS CI360 and handled by an IdP outside SAS (e.g. OneLogin, Okta, etc.). If so, while SAS Ci360 itself does not support restricting access from certain IP addresses (or accepting access only from certain IP addresses), would it be possible for customers to do such thing by configuring it at the IdP that they choose to use?
I have seen some customers especially in banking who want to control the access to their SAS CI360 tenant only from their networks, just like accessing via VPN. I know the major IdPs like OneLogin, Okta, etc. provide a feature for their users to configure accepting/filtering access for login by IP addresses, and I wonder if we can do so for SAS CI360.
Yuma
To respond to @YumaHase
With federated single sign-on for SAS Customer Intelligence 360 (CI 360), the customer's identity provider (IDP) is the source of authentication. Yes, the customer can restrict authentication to only specific IPs or networks if the customer is using an IDP vendor or technology that provides this capability.
This IP restriction would only restrict the IP addresses that authenticate through SSO federation, In other words, IP restrictions would only apply to users of the customer’s CI 360 tenants that are managed by the customer’s IDP. If tenant admins have authorized users that are not managed by the customer IDP (for example, SAS employees or other outside consultants/contractors), those users would not be required to adhere to any IP or network restrictions. The IP restriction only applies to the IPs that access the customer's IDP and not all of the IPs that access CI 360. No IP restrictions are implemented or enforced by SAS personnel or the CI 360 systems.
If you are referring to the possibility of using a VPN for on-premises, agent-based access to CI 360, the current architecture does not support using a VPN nor the ability to restrict access to specific IP addresses.
Registration is open! SAS is returning to Vegas for an AI and analytics experience like no other! Whether you're an executive, manager, end user or SAS partner, SAS Innovate is designed for everyone on your team. Register for just $495 by 12/31/2023.
If you are interested in speaking, there is still time to submit a session idea. More details are posted on the website.
Data Literacy is for all, even absolute beginners. Jump on board with this free e-learning and boost your career prospects.