Last updated on
Mar 3, 2025
- User basics
- User permissions overview
- Resolve user access issues
- Edit user information
- Edit user group membership
- Assign a user to a manager
- Edit team members
- View a user report
- Customize user profile fields
- Set login and password policies
- Configure single sign-on
- Create additional administrators
- Manage guests
- Bulk user import
- Getting started
- Manage groups
- Cost centers
- Audio providers
- User interface customization
- Compliance and control
- Administration dashboard
You can integrate Adobe Connect with a SAML 2.0-based identity provider (for example, Okta) to provide secure identity management and single sign-on (SSO) services. To enable SSO, configuration changes are required both at the identity provider (IDP) side and the Adobe Connect server.
To enable SSO:
- Configure the IDP: You must configure your Adobe Connect account as a service provider prior to setting up SSO in Connect Central
- Set the SAML recipient and SAML audience parameters for the service provider profile as <Connect_ACCOUNT_URL>/saml/cps.
- In the SAML Name ID field, specify email address as the user identifier in SAML exchanges.
- Add the custom attributes firstname and lastname to the profile. The attributes are passed in the SAML response.
- Save the changes.
- Enable SSO in Connect Central:
- Go to Admin > Users and groups > SSO settings.
- Check Enable SSO.
- Specify the IDP type.
- Specify your domain.
- Import your IDP metadata file. (See example below)
- Select Save.
- Contact Adobe Connect Customer Care to provision SSO authentication in your Adobe Connect account. If you are using on On Premise Server, contact your IT admin.
IDP metadata file example
<?xml version="1.0" encoding="UTF-8" standalone="yes"?> <EntityDescriptor entityID="<ADOBECONNECT_ACCOUNT_URL>/saml/cps" xmlns="urn:oasis:names:tc:SAML:2.0:metadata"> <SPSSODescriptor AuthnRequestsSigned="false" WantAssertionsSigned="true" protocolSupportEnumeration="urn:oasis:names:tc:SAML:2.0:protocol"> <NameIDFormat>urn:oasis:names:tc:SAML:1.1:nameid-format: emailAddress</NameIDFormat> <AssertionConsumerService index="0" isDefault="true" Binding="urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST" Location="<ADOBECONNECT_ACCOUNT_URL>/saml/cps"/> </SPSSODescriptor> </EntityDescriptor>
More like this
- Configure security (CSRF, SSL, session timeout, and so on)
- Enable single sign-on
- Edit login and password policies
- Using web services to manage meeting passcodes
- Single sign-on configuration for the on-premise server
- Adobe Connect User Guide
- Adobe Connect Learn and Support home