Who is this article for?
Incydr
Code42 for Enterprise
CrashPlan for Enterprise
Incydr, yes.
CrashPlan for Enterprise, yes.
Code42 for Enterprise, yes.
CrashPlan for Small Business, no.
This article applies to Code42 cloud environments.
Other available versions:
On-premises
Overview
This tutorial explains how to configure your Code42 environment with on on-premises authority server to use single sign-on (SSO) with OneLogin. In this article, OneLogin is also referred to as an identity provider.
This article assumes you are already familiar with SSO and the SAML standard. For more information about how the Code42 platform implements SSO, see our Introduction to single sign-on.
Compatible Code42 platform components
Compatible With SSO
- Code42 app for Windows, Mac, and Linux
- Code42 console
Incompatible With SSO
- Code42 apps for iOS, Android, and Windows Phone
Considerations
- Code42 usernames must match SSO usernames. How you accomplish this depends on how you deploy Code42 apps.
- Code42 supports service provider-initiated SSO but does not support identity provider-initiated SSO. Therefore, users cannot sign in to your Code42 environment from the identity provider's website or application, but instead must log in using a browser bookmark.
- SSO provides user authentication but does not provide user management. Set up SCIM provisioning or use the Code42 console to manage users.
- Code42 does not support Single Logout (SLO). Users must sign out of the identity provider to end their single sign-on session.
- To configure Code42 to support advanced SAML request configurations using the Code42 API, see Use the Code42 API to set SAML attributes.
External authentication systems
Our Customer Champions can help with authentication issues caused by interaction with Code42 products. However, troubleshooting authentication issues outside your Code42 environment is beyond the scope of our Customer Champions. For assistance with external authentication systems, contact your authentication vendor.
Before you begin
Verify identity provider configuration
- Make sure the SSL certificate of your SSO identity provider has been signed by a trusted Certificate Authority (CA).
- Make sure you have administrative access to the identity provider or have contact with an identity provider administrator.
Verify network configuration
- Configure your private network, Internet, and VPN settings to allow client devices to communicate with your identity provider on port 443. Test client connectivity to the identity provider before you proceed.
- If you want to use URL-based metadata exchange to configure Code42 and the identity provider to work together, make sure two-way communication is available between them on TCP port 443. If two-way communication is not available or not allowed, you must download the identity provider's metadata file and make it accessible to Code42.
- Confirm the required ports with your identity provider to determine if custom ports are being used.
Step 1: Determine the Code42 URL to enter in OneLogin
- Sign in to the Code42 console.
- Navigate to Administration > Integrations > Identity Management.

- Copy and paste the Code42 Service Provider Metadata URL in a new browser window.
Your Code42 environment's metadata details appear.
- Record the URL for Location. You will use this when configuring your authentication provider.

Step 2: Prepare OneLogin
- Sign in to the OneLogin dashboard.
- Select Add Apps and search for Code42 CrashPlan.
- Add Code42 CrashPlan, and click Save.
- In the OneLogin Configuration tab, complete the following fields:
- SAML Consumer URL: Enter the URL from Step 1: Determine your Code42 server URL.
For example: https://example.com
- Login URL: Enter the Code42 Service Provider Metadata URL.
For example: https://example.com:4285/api/SspAuthSPMetadata?registrationKey=42424242424242424242
- Click Save.
- In the SSO tab, copy the value from the Issuer URL field, for example:
https://app.onelogin.com/saml/metadata/123456
This value is the Provider's Metadata URL you will paste in to the Code42 console in the next step.
Step 3: Add OneLogin as an authentication provider in Code42
Step 4: Test SSO authentication
- Create a test user in your identity provider.
- Sign in to the Code42 console.
- Create a test organization.
- Configure the test organization to use SSO.
- Navigate to Administration > Integrations > Organizations, then select the organization.
- From the action menu in the upper-right, select Edit.
- Click Security.
.png?revision=1&size=bestfit&width=1093&height=717)
- Deselect Inherit security settings from parent.
- From Select an authentication method, choose SSO.
The configured SSO identity providers appear.
- Select the identity providers that you want to offer for the organization.
- From Select a directory service, select Local.
- Click Save.
- Type ENABLE in the field provided and click ENABLE.
- Create a user in the test organization who matches the identity provider test user.
- In the upper-right of the Code42 console, select Account
> Sign Out.
- Sign back in to the Code42 console as the test user to verify that SSO is working.
Step 5: Configure organizations to use SSO
Enable SSO for one or more organizations in your Code42 environment. If two or more authentication providers are offered in your Code42 environment, tell the users in each organization which authentication provider they should choose when they sign in.
Option A: Enable SSO for a specific organization
- Sign in to the Code42 console.
- Navigate to Administration > Environment > Organizations, then select the organization.
- From the action menu, select Edit.
- Click Security.
.png?revision=1&size=bestfit&width=1093&height=717)
- Deselect Inherit security settings from parent.
Disabled inheritance
If you
disable inheritance for an organization, that organization is not affected by changes to its parent organization.
- From Select an authentication method, choose SSO.
The configured authentication providers appear.
- Select the identity providers that you want to offer for the organization.
- From Select a directory service, select Local.
- Click Save.
Option B: Enable SSO for all organizations
Modify the system-wide organization settings to enable SSO for all organizations.
- Sign in to the Code42 console.
- Go to Administration > Environment > Organizations.
- Click on the top-level organization.
The organization details appear.
- From the action menu, select Edit.
- Click Security.

- From Select an authentication method, choose SSO.
The configured authentication providers appear.
- Select the identity providers that you want to offer to your organizations.
- From Select a directory service, select Local.
- Click Save.
- Under each child organization, make sure that Inherit security settings from parent is enabled.
- Click the child organization.
- From the action menu, select Edit.
- Click Security.
- Enable Inherit security settings from parent.
Step 6: Add new users that sign in with SSO
Option A: Add users in the Code42 console
Use the Code42 console to add users to an organization that uses SSO.
- Verify that the users in the organization exist in the SSO identity provider used by the organization.
- Make sure that the Code42 environment usernames match the SSO usernames.
Option B: Deploy the Code42 app
New users can register accounts in your Code42 environment:
- Distribute the Code42 app installer to new users.
- Choose Sign up for an account when you open the Code42 app.
- Create an account using the SSO credentials. The Code42 app username must match the SSO username.
What to expect
Reduced authentication prompts
When a user signs in with SSO, the user does not need to re-enter credentials for subsequent authentication attempts until the SAML authentication token expires. A SAML token applies to an application rather than a device, which means that a user might need to enter credentials again when signing into a different app. Signing in to the Code42 app does not authenticate the Code42 console because one is an app on the device and the other is accessed via a web browser.
Losing access to an identity provider
If a user loses access to the identity provider, the Code42 app continues to back up, uninterrupted.