<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>article Example auth0 SAML setup with Qlik Sense Enterprise on Windows in Official Support Articles</title>
    <link>https://community.qlik.com/t5/Official-Support-Articles/Example-auth0-SAML-setup-with-Qlik-Sense-Enterprise-on-Windows/ta-p/1713277</link>
    <description>&lt;P&gt;The steps below are for an example test setup of SAML authentication using auth0 as Identity Provider with Qlik Sense Enterprise on Windows.&lt;/P&gt;
&lt;BLOCKQUOTE class="quote"&gt;This customization is provided as is. Qlik Support cannot provide continued support of the solution. For assistance, reach out to our&amp;nbsp;&lt;A href="https://community.qlik.com/t5/Official-Support-Articles/How-and-when-to-contact-Qlik-s-Professional-Services-and/ta-p/1714936" target="_blank" rel="noopener"&gt;Professional Services&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;or engage in our active&amp;nbsp;&lt;A href="https://community.qlik.com/t5/Integration-Extension-APIs/bd-p/qlik-sense-integration-extension-api" target="_blank" rel="noopener"&gt;Integrations forum&lt;/A&gt;.&lt;/SPAN&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;&lt;STRONG&gt;Note:&lt;/STRONG&gt; These steps assume an &lt;A href="http://auth0.com" target="_blank" rel="noopener"&gt;auth0&lt;/A&gt; "Developer" account has already been created&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H4&gt;&lt;FONT color="#339966"&gt;&lt;STRONG&gt;On Auth0 site:&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H4&gt;
&lt;OL&gt;
&lt;LI&gt;Logon to the auth0 &lt;STRONG&gt;Dashboard&lt;/STRONG&gt; and click on &lt;STRONG&gt;+ NEW APPLICATION&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;LI&gt;Give it an appropriate name (e.g. "QS_interactive_logon")&lt;/LI&gt;
&lt;LI&gt;Chose an application type: &lt;STRONG&gt;Single Page Web Applications&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;Click on &lt;STRONG&gt;Create&lt;/STRONG&gt; and ignore any tutorials&lt;/LI&gt;
&lt;LI&gt;Go to &lt;STRONG&gt;Connections &amp;gt; Database&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;Click on &lt;STRONG&gt;+ CREATE DB CONNECTION&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;Give it an appropriate name (e.g: "QS_interactive_Users"), and click on &lt;STRONG&gt;Create&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;Then go to the &lt;STRONG&gt;Applications&lt;/STRONG&gt; tab and enable the connection only for the new application created above.&lt;/LI&gt;
&lt;LI&gt;Go to &lt;STRONG&gt;Users &amp;amp; Roles &amp;gt; Users and click on + CREATE USER&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;Auth0 will send out an email message to the user to verify the account.&lt;/LI&gt;
&lt;LI&gt;On the new user's &lt;STRONG&gt;Details&lt;/STRONG&gt; page, scroll down to the &lt;STRONG&gt;Metadata &amp;gt; user_metadata&lt;/STRONG&gt; section&lt;/LI&gt;
&lt;LI&gt;Add the following in the JSON formatted text box in order to associate the "&lt;SPAN&gt;Everyone&lt;/SPAN&gt;" group to this user:&lt;BR /&gt;&lt;BR /&gt;user_metadata:&lt;BR /&gt;&lt;LI-CODE lang="markup"&gt;{
 "groups": [
   "Everyone"
 ]
}​&lt;/LI-CODE&gt;&lt;/LI&gt;
&lt;LI&gt;Go back to &lt;STRONG style="font-family: inherit;"&gt;Applications&lt;/STRONG&gt;&lt;SPAN&gt; and select your new application&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;Under the &lt;/SPAN&gt;&lt;STRONG style="font-family: inherit;"&gt;Connections&lt;/STRONG&gt;&lt;SPAN&gt; make sure no other Database connections are enabled&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;Go to&lt;/SPAN&gt;&lt;STRONG style="font-family: inherit;"&gt; Rules&lt;/STRONG&gt;&lt;SPAN&gt; and click on &lt;/SPAN&gt;&lt;STRONG style="font-family: inherit;"&gt;+ CREATE RULE&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;Select the &lt;/SPAN&gt;&lt;SPAN&gt;&amp;lt;/&amp;gt; Empty rule&lt;/SPAN&gt;&lt;SPAN&gt; options under &lt;/SPAN&gt;&lt;STRONG style="font-family: inherit;"&gt;Empty&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;Give it the name "&lt;/SPAN&gt;&lt;SPAN&gt;Add groups to claim&lt;/SPAN&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;Add the following to the &lt;/SPAN&gt;&lt;STRONG style="font-family: inherit;"&gt;Script&lt;/STRONG&gt;&lt;SPAN&gt; box:&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;Script:&lt;BR /&gt;&lt;LI-CODE lang="markup"&gt;function (user, context, callback) {
if((user.user_metadata || {} ).groups){
context.idToken['https://qlik.com/groups'] = user.user_metadata.groups;
}
callback(null, user, context);
}​&lt;/LI-CODE&gt;&lt;/LI&gt;
&lt;LI&gt;Go to Rules and click on &lt;STRONG style="font-family: inherit;"&gt;+ CREATE RULE&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;Select the &lt;/SPAN&gt;&lt;SPAN&gt;&amp;lt;/&amp;gt; Empty rule&lt;/SPAN&gt;&lt;SPAN&gt; options under &lt;/SPAN&gt;&lt;STRONG style="font-family: inherit;"&gt;Empty&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;Give it the name "&lt;/SPAN&gt;&lt;SPAN&gt;Add sub as email&lt;/SPAN&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;Add the following to the &lt;/SPAN&gt;&lt;STRONG style="font-family: inherit;"&gt;Script&lt;/STRONG&gt;&lt;SPAN&gt;&lt;SPAN&gt; box:&lt;BR /&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;LI-CODE lang="markup"&gt;function (user, context, callback) {
 context.idToken['https://qlik.com/sub'] = user.email;
 callback(null, user, context);
}&lt;/LI-CODE&gt;&lt;/LI&gt;
&lt;LI&gt;Under &lt;STRONG style="font-family: inherit;"&gt;Connections &amp;gt; Database&lt;/STRONG&gt;&lt;SPAN&gt; select the connection created.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;Click on the &lt;/SPAN&gt;&lt;STRONG style="font-family: inherit;"&gt;Try Connection&lt;/STRONG&gt;&lt;SPAN&gt; tab and a authentication page will open on a new browser tab.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;If the setup is correct a page displaying "&lt;/SPAN&gt;&lt;SPAN&gt;It Works!&lt;/SPAN&gt;&lt;SPAN&gt;" should be displayed with user profile metadata information further down the page.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;Go to &lt;/SPAN&gt;&lt;STRONG style="font-family: inherit;"&gt;Applications&lt;/STRONG&gt;&lt;SPAN&gt; and click on the newly created application.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;Then go to the &lt;/SPAN&gt;&lt;STRONG style="font-family: inherit;"&gt;Addons&lt;/STRONG&gt;&lt;SPAN&gt; tab and click on &lt;/SPAN&gt;&lt;STRONG style="font-family: inherit;"&gt;SAML2 WEB APP&lt;/STRONG&gt;&lt;SPAN&gt;.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;Under the &lt;/SPAN&gt;&lt;STRONG style="font-family: inherit;"&gt;Settings &amp;gt; Application Callback URL&lt;/STRONG&gt;&lt;SPAN&gt; configure the URL with the following format:&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;Application Callback URL:&amp;nbsp;&lt;FONT face="courier new,courier"&gt;https://&amp;lt;Qlik Sense FQDN&amp;gt;/&amp;lt;Virtual Proxy prefix&amp;gt;/samlauthn/&lt;/FONT&gt;&lt;BR /&gt;&lt;BR /&gt;Where:&lt;BR /&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;&lt;SPAN&gt;&amp;lt;Qlik Sense FQDN&amp;gt;&lt;/SPAN&gt;&lt;/FONT&gt; is the fully qualified name of the server as it is reachable by the user.&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;&lt;SPAN&gt;&amp;lt;Virtual Proxy prefix&lt;/SPAN&gt;&amp;gt;&lt;/FONT&gt; will be the prefix configured in the new Qlik Sense Virtual Proxy to be created on the next Qlik Sense steps below.&lt;BR /&gt;- e.g: &lt;SPAN&gt;&lt;A href="https://qlikserver1.domain.local/auth0/samlauthn/" target="test_blank"&gt;https://qlikserver1.domain.local/auth0/samlauthn/&lt;/A&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;Note1:&lt;/STRONG&gt; Make sure the last slash in the URL is present as it may lead to errors otherwise!&lt;BR /&gt;&lt;STRONG&gt;Note2:&lt;/STRONG&gt; This also adds a new URL to the &lt;STRONG&gt;Application &amp;gt; Setting &amp;gt; Allowed Callback URLs&lt;/STRONG&gt; field every time the above is changed.&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;Now under &lt;/SPAN&gt;&lt;STRONG style="font-family: inherit;"&gt;Addons: SAML2 Web App &amp;gt; Usage &amp;gt; Identity Provider Metadata:&lt;/STRONG&gt;&lt;SPAN&gt; click &lt;/SPAN&gt;&lt;STRONG style="font-family: inherit;"&gt;download&lt;/STRONG&gt;&lt;SPAN&gt; and store the IdP metadata xml file which will be used in the next Qlik Sense steps below.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;H4&gt;&lt;BR /&gt;&lt;FONT color="#339966"&gt;&lt;STRONG&gt;On Qlik Sense Management Console (QMC):&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H4&gt;
&lt;OL&gt;
&lt;LI&gt;Under &lt;STRONG&gt;START &amp;gt; CONFIGURE SYSTEM &amp;gt; Virtual Proxies&lt;/STRONG&gt;, click on &lt;STRONG&gt;Create new&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;Configure the following values under &lt;STRONG&gt;IDENTIFICATION&lt;/STRONG&gt; and &lt;STRONG&gt;AUTHENTICATION&lt;/STRONG&gt; areas.&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;TABLE border="1" width="100%"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD width="10%" height="47px" style="background-color: ghostwhite;"&gt;&lt;STRONG&gt;Description&lt;/STRONG&gt;&lt;/TD&gt;
&lt;TD width="30%" height="47px" style="background-color: ghostwhite;"&gt;SAML_auth0&lt;/TD&gt;
&lt;TD width="60%" height="47px" style="background-color: ghostwhite;"&gt;An appropriate description&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="10%" height="47px"&gt;&lt;STRONG&gt;Prefix&lt;/STRONG&gt;&lt;/TD&gt;
&lt;TD width="30%" height="47px"&gt;auth0&lt;/TD&gt;
&lt;TD width="60%" height="47px"&gt;This will be the prefix used when accessing Qlik Sense via URL&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="10%" height="47px" style="background-color: ghostwhite;"&gt;&lt;STRONG&gt;Session cookie header name&lt;/STRONG&gt;&lt;/TD&gt;
&lt;TD width="30%" height="47px" style="background-color: ghostwhite;"&gt;X-Qlik-Session-auth0&lt;/TD&gt;
&lt;TD width="60%" height="47px" style="background-color: ghostwhite;"&gt;Needs to differ for every Virtual Proxy&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="10%" height="47px"&gt;&lt;STRONG&gt;Authentication method&lt;/STRONG&gt;&lt;/TD&gt;
&lt;TD width="30%" height="47px"&gt;SAML&lt;/TD&gt;
&lt;TD width="60%" height="47px"&gt;The authentication enabled via auth0&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="10%" height="47px" style="background-color: ghostwhite;"&gt;&lt;STRONG&gt;SAML host URI&lt;/STRONG&gt;&lt;/TD&gt;
&lt;TD width="30%" height="47px" style="background-color: ghostwhite;"&gt;https://&lt;/TD&gt;
&lt;TD width="60%" height="47px" style="background-color: ghostwhite;"&gt;The Qlik Sense Server&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="10%" height="47px"&gt;&lt;STRONG&gt;SAML entity ID&lt;/STRONG&gt;&lt;/TD&gt;
&lt;TD width="30%" height="47px"&gt;https://.auth0.com&lt;/TD&gt;
&lt;TD width="60%" height="47px"&gt;This can be found in the metadata file downloaded from auth0 under entityID&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="10%" height="47px" style="background-color: ghostwhite;"&gt;&lt;STRONG&gt;SAML IdP metadata&lt;/STRONG&gt;&lt;/TD&gt;
&lt;TD width="30%" height="47px" style="background-color: ghostwhite;"&gt;Choose File: This is the xml file downloaded from Auth0&lt;/TD&gt;
&lt;TD width="60%" height="47px" style="background-color: ghostwhite;"&gt;The IdP metadata file downloaded from auth0&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="10%" height="47px"&gt;&lt;STRONG&gt;SAML attribute for user ID&lt;/STRONG&gt;&lt;/TD&gt;
&lt;TD width="30%" height="47px"&gt;See&amp;nbsp;&lt;A href="https://learn.microsoft.com/en-us/windows-server/identity/ad-fs/technical-reference/the-role-of-claims#:~:text=URI-,E%2DMail%20Address,http%3A//schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress,-Given%20Name" target="_blank" rel="noopener"&gt;Claim Types (learn.microsoft)&lt;/A&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD width="60%" height="47px"&gt;This is also found in the metadata file from auth0&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="10%" height="47px" style="background-color: ghostwhite;"&gt;&lt;STRONG&gt;SAML attribute for user directory&lt;/STRONG&gt;&lt;/TD&gt;
&lt;TD width="30%" height="47px" style="background-color: ghostwhite;"&gt;[Auth0]&lt;/TD&gt;
&lt;TD width="60%" height="47px" style="background-color: ghostwhite;"&gt;Directory name&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="10%" height="47px"&gt;&lt;STRONG&gt;SAML signing algorithm&lt;/STRONG&gt;&lt;/TD&gt;
&lt;TD width="30%" height="47px"&gt;SHA-1&lt;/TD&gt;
&lt;TD width="60%" height="47px"&gt;Used by auth0&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL start="3"&gt;
&lt;LI&gt;&lt;SPAN&gt;Under the Virtual Proxy's &lt;/SPAN&gt;&lt;STRONG style="font-family: inherit;"&gt;LOAD BALANCING&lt;/STRONG&gt;&lt;SPAN&gt; configuration, map the appropriate Server node or the proxy will not be usable.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;Click on &lt;/SPAN&gt;&lt;STRONG style="font-family: inherit;"&gt;Apply&lt;/STRONG&gt;&lt;SPAN&gt;, then go back into it and click on &lt;/SPAN&gt;&lt;STRONG style="font-family: inherit;"&gt;View Content&lt;/STRONG&gt;&lt;SPAN&gt; link under the &lt;/SPAN&gt;&lt;STRONG style="font-family: inherit;"&gt;SAML IdP metadata&lt;/STRONG&gt;&lt;SPAN&gt;. This is the auth0 IdP metadata that was uploaded to this Virtual Proxy settings.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;Go back to &lt;/SPAN&gt;&lt;STRONG style="font-family: inherit;"&gt;START &amp;gt; CONFIGURE SYSTEM &amp;gt; Virtual Proxies&lt;/STRONG&gt;&lt;SPAN&gt;, highlight the auth0 Virtual Proxy created and click on &lt;/SPAN&gt;&lt;STRONG style="font-family: inherit;"&gt;Download SP metadata&lt;/STRONG&gt;&lt;SPAN&gt;.&lt;/SPAN&gt;&lt;SPAN&gt; This is the Qlik Sense SP metadata.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;Open the Qlik Sense SP metadata with a browser (e.g: IE) and view it. Notice that the &lt;/SPAN&gt;&lt;SPAN&gt;Location=&lt;/SPAN&gt;&lt;SPAN&gt; URL under &lt;/SPAN&gt;&lt;SPAN&gt;AssertionConsumerService&lt;/SPAN&gt;&lt;SPAN&gt; should match what was included in the Auth0's setting &lt;/SPAN&gt;&lt;STRONG style="font-family: inherit;"&gt;Application Callback URL&lt;/STRONG&gt;&lt;SPAN&gt;.&lt;/SPAN&gt;&lt;SPAN&gt; This can be confirmed in the Auth0's site under &lt;/SPAN&gt;&lt;STRONG style="font-family: inherit;"&gt;Applications &amp;gt;&lt;/STRONG&gt;&lt;SPAN&gt; the created application &lt;/SPAN&gt;&lt;STRONG style="font-family: inherit;"&gt;&amp;gt; Settings &amp;gt; Application URIs &amp;gt; Allowed Callbacks URLs&lt;/STRONG&gt;&lt;SPAN&gt;.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;Test the authentication via the new SAML Virtual Proxy by going to &lt;SPAN&gt;&lt;A href="https://&amp;lt;Qlik" target="test_blank"&gt;https://&amp;lt;Qlik&lt;/A&gt; Sense FQDN&amp;gt;/&amp;lt;prefix&amp;gt;/qmc. (&lt;/SPAN&gt;&lt;SPAN&gt;e.g:&lt;/SPAN&gt;&lt;SPAN&gt; https//qlikserver2.domain.local/auth0/qmc)&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;&lt;FONT color="#339966"&gt;Related Content:&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/H3&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://community.qlik.com/t5/Knowledge/Qlik-Sense-What-are-SAML-attributes/ta-p/1717415" target="_blank" rel="noopener"&gt;Qlik Sense: What are SAML attributes&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://community.qlik.com/t5/Qlik-Support-Knowledge-Base/Quick-Guide-to-installing-ADFS-for-testing-SAML/ta-p/1710427" target="_blank" rel="noopener"&gt;Quick Guide to installing ADFS for testing SAML&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;</description>
    <pubDate>Thu, 25 Jan 2024 09:30:34 GMT</pubDate>
    <dc:creator>Andre_Sostizzo</dc:creator>
    <dc:date>2024-01-25T09:30:34Z</dc:date>
    <item>
      <title>Example auth0 SAML setup with Qlik Sense Enterprise on Windows</title>
      <link>https://community.qlik.com/t5/Official-Support-Articles/Example-auth0-SAML-setup-with-Qlik-Sense-Enterprise-on-Windows/ta-p/1713277</link>
      <description>&lt;P&gt;The steps below are for an example test setup of SAML authentication using auth0 as Identity Provider with Qlik Sense Enterprise on Windows.&lt;/P&gt;
&lt;BLOCKQUOTE class="quote"&gt;This customization is provided as is. Qlik Support cannot provide continued support of the solution. For assistance, reach out to our&amp;nbsp;&lt;A href="https://community.qlik.com/t5/Official-Support-Articles/How-and-when-to-contact-Qlik-s-Professional-Services-and/ta-p/1714936" target="_blank" rel="noopener"&gt;Professional Services&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;or engage in our active&amp;nbsp;&lt;A href="https://community.qlik.com/t5/Integration-Extension-APIs/bd-p/qlik-sense-integration-extension-api" target="_blank" rel="noopener"&gt;Integrations forum&lt;/A&gt;.&lt;/SPAN&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;&lt;STRONG&gt;Note:&lt;/STRONG&gt; These steps assume an &lt;A href="http://auth0.com" target="_blank" rel="noopener"&gt;auth0&lt;/A&gt; "Developer" account has already been created&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H4&gt;&lt;FONT color="#339966"&gt;&lt;STRONG&gt;On Auth0 site:&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H4&gt;
&lt;OL&gt;
&lt;LI&gt;Logon to the auth0 &lt;STRONG&gt;Dashboard&lt;/STRONG&gt; and click on &lt;STRONG&gt;+ NEW APPLICATION&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;LI&gt;Give it an appropriate name (e.g. "QS_interactive_logon")&lt;/LI&gt;
&lt;LI&gt;Chose an application type: &lt;STRONG&gt;Single Page Web Applications&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;Click on &lt;STRONG&gt;Create&lt;/STRONG&gt; and ignore any tutorials&lt;/LI&gt;
&lt;LI&gt;Go to &lt;STRONG&gt;Connections &amp;gt; Database&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;Click on &lt;STRONG&gt;+ CREATE DB CONNECTION&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;Give it an appropriate name (e.g: "QS_interactive_Users"), and click on &lt;STRONG&gt;Create&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;Then go to the &lt;STRONG&gt;Applications&lt;/STRONG&gt; tab and enable the connection only for the new application created above.&lt;/LI&gt;
&lt;LI&gt;Go to &lt;STRONG&gt;Users &amp;amp; Roles &amp;gt; Users and click on + CREATE USER&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;Auth0 will send out an email message to the user to verify the account.&lt;/LI&gt;
&lt;LI&gt;On the new user's &lt;STRONG&gt;Details&lt;/STRONG&gt; page, scroll down to the &lt;STRONG&gt;Metadata &amp;gt; user_metadata&lt;/STRONG&gt; section&lt;/LI&gt;
&lt;LI&gt;Add the following in the JSON formatted text box in order to associate the "&lt;SPAN&gt;Everyone&lt;/SPAN&gt;" group to this user:&lt;BR /&gt;&lt;BR /&gt;user_metadata:&lt;BR /&gt;&lt;LI-CODE lang="markup"&gt;{
 "groups": [
   "Everyone"
 ]
}​&lt;/LI-CODE&gt;&lt;/LI&gt;
&lt;LI&gt;Go back to &lt;STRONG style="font-family: inherit;"&gt;Applications&lt;/STRONG&gt;&lt;SPAN&gt; and select your new application&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;Under the &lt;/SPAN&gt;&lt;STRONG style="font-family: inherit;"&gt;Connections&lt;/STRONG&gt;&lt;SPAN&gt; make sure no other Database connections are enabled&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;Go to&lt;/SPAN&gt;&lt;STRONG style="font-family: inherit;"&gt; Rules&lt;/STRONG&gt;&lt;SPAN&gt; and click on &lt;/SPAN&gt;&lt;STRONG style="font-family: inherit;"&gt;+ CREATE RULE&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;Select the &lt;/SPAN&gt;&lt;SPAN&gt;&amp;lt;/&amp;gt; Empty rule&lt;/SPAN&gt;&lt;SPAN&gt; options under &lt;/SPAN&gt;&lt;STRONG style="font-family: inherit;"&gt;Empty&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;Give it the name "&lt;/SPAN&gt;&lt;SPAN&gt;Add groups to claim&lt;/SPAN&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;Add the following to the &lt;/SPAN&gt;&lt;STRONG style="font-family: inherit;"&gt;Script&lt;/STRONG&gt;&lt;SPAN&gt; box:&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;Script:&lt;BR /&gt;&lt;LI-CODE lang="markup"&gt;function (user, context, callback) {
if((user.user_metadata || {} ).groups){
context.idToken['https://qlik.com/groups'] = user.user_metadata.groups;
}
callback(null, user, context);
}​&lt;/LI-CODE&gt;&lt;/LI&gt;
&lt;LI&gt;Go to Rules and click on &lt;STRONG style="font-family: inherit;"&gt;+ CREATE RULE&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;Select the &lt;/SPAN&gt;&lt;SPAN&gt;&amp;lt;/&amp;gt; Empty rule&lt;/SPAN&gt;&lt;SPAN&gt; options under &lt;/SPAN&gt;&lt;STRONG style="font-family: inherit;"&gt;Empty&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;Give it the name "&lt;/SPAN&gt;&lt;SPAN&gt;Add sub as email&lt;/SPAN&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;Add the following to the &lt;/SPAN&gt;&lt;STRONG style="font-family: inherit;"&gt;Script&lt;/STRONG&gt;&lt;SPAN&gt;&lt;SPAN&gt; box:&lt;BR /&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;LI-CODE lang="markup"&gt;function (user, context, callback) {
 context.idToken['https://qlik.com/sub'] = user.email;
 callback(null, user, context);
}&lt;/LI-CODE&gt;&lt;/LI&gt;
&lt;LI&gt;Under &lt;STRONG style="font-family: inherit;"&gt;Connections &amp;gt; Database&lt;/STRONG&gt;&lt;SPAN&gt; select the connection created.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;Click on the &lt;/SPAN&gt;&lt;STRONG style="font-family: inherit;"&gt;Try Connection&lt;/STRONG&gt;&lt;SPAN&gt; tab and a authentication page will open on a new browser tab.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;If the setup is correct a page displaying "&lt;/SPAN&gt;&lt;SPAN&gt;It Works!&lt;/SPAN&gt;&lt;SPAN&gt;" should be displayed with user profile metadata information further down the page.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;Go to &lt;/SPAN&gt;&lt;STRONG style="font-family: inherit;"&gt;Applications&lt;/STRONG&gt;&lt;SPAN&gt; and click on the newly created application.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;Then go to the &lt;/SPAN&gt;&lt;STRONG style="font-family: inherit;"&gt;Addons&lt;/STRONG&gt;&lt;SPAN&gt; tab and click on &lt;/SPAN&gt;&lt;STRONG style="font-family: inherit;"&gt;SAML2 WEB APP&lt;/STRONG&gt;&lt;SPAN&gt;.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;Under the &lt;/SPAN&gt;&lt;STRONG style="font-family: inherit;"&gt;Settings &amp;gt; Application Callback URL&lt;/STRONG&gt;&lt;SPAN&gt; configure the URL with the following format:&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;Application Callback URL:&amp;nbsp;&lt;FONT face="courier new,courier"&gt;https://&amp;lt;Qlik Sense FQDN&amp;gt;/&amp;lt;Virtual Proxy prefix&amp;gt;/samlauthn/&lt;/FONT&gt;&lt;BR /&gt;&lt;BR /&gt;Where:&lt;BR /&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;&lt;SPAN&gt;&amp;lt;Qlik Sense FQDN&amp;gt;&lt;/SPAN&gt;&lt;/FONT&gt; is the fully qualified name of the server as it is reachable by the user.&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;&lt;SPAN&gt;&amp;lt;Virtual Proxy prefix&lt;/SPAN&gt;&amp;gt;&lt;/FONT&gt; will be the prefix configured in the new Qlik Sense Virtual Proxy to be created on the next Qlik Sense steps below.&lt;BR /&gt;- e.g: &lt;SPAN&gt;&lt;A href="https://qlikserver1.domain.local/auth0/samlauthn/" target="test_blank"&gt;https://qlikserver1.domain.local/auth0/samlauthn/&lt;/A&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;Note1:&lt;/STRONG&gt; Make sure the last slash in the URL is present as it may lead to errors otherwise!&lt;BR /&gt;&lt;STRONG&gt;Note2:&lt;/STRONG&gt; This also adds a new URL to the &lt;STRONG&gt;Application &amp;gt; Setting &amp;gt; Allowed Callback URLs&lt;/STRONG&gt; field every time the above is changed.&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;Now under &lt;/SPAN&gt;&lt;STRONG style="font-family: inherit;"&gt;Addons: SAML2 Web App &amp;gt; Usage &amp;gt; Identity Provider Metadata:&lt;/STRONG&gt;&lt;SPAN&gt; click &lt;/SPAN&gt;&lt;STRONG style="font-family: inherit;"&gt;download&lt;/STRONG&gt;&lt;SPAN&gt; and store the IdP metadata xml file which will be used in the next Qlik Sense steps below.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;H4&gt;&lt;BR /&gt;&lt;FONT color="#339966"&gt;&lt;STRONG&gt;On Qlik Sense Management Console (QMC):&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H4&gt;
&lt;OL&gt;
&lt;LI&gt;Under &lt;STRONG&gt;START &amp;gt; CONFIGURE SYSTEM &amp;gt; Virtual Proxies&lt;/STRONG&gt;, click on &lt;STRONG&gt;Create new&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;Configure the following values under &lt;STRONG&gt;IDENTIFICATION&lt;/STRONG&gt; and &lt;STRONG&gt;AUTHENTICATION&lt;/STRONG&gt; areas.&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;TABLE border="1" width="100%"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD width="10%" height="47px" style="background-color: ghostwhite;"&gt;&lt;STRONG&gt;Description&lt;/STRONG&gt;&lt;/TD&gt;
&lt;TD width="30%" height="47px" style="background-color: ghostwhite;"&gt;SAML_auth0&lt;/TD&gt;
&lt;TD width="60%" height="47px" style="background-color: ghostwhite;"&gt;An appropriate description&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="10%" height="47px"&gt;&lt;STRONG&gt;Prefix&lt;/STRONG&gt;&lt;/TD&gt;
&lt;TD width="30%" height="47px"&gt;auth0&lt;/TD&gt;
&lt;TD width="60%" height="47px"&gt;This will be the prefix used when accessing Qlik Sense via URL&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="10%" height="47px" style="background-color: ghostwhite;"&gt;&lt;STRONG&gt;Session cookie header name&lt;/STRONG&gt;&lt;/TD&gt;
&lt;TD width="30%" height="47px" style="background-color: ghostwhite;"&gt;X-Qlik-Session-auth0&lt;/TD&gt;
&lt;TD width="60%" height="47px" style="background-color: ghostwhite;"&gt;Needs to differ for every Virtual Proxy&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="10%" height="47px"&gt;&lt;STRONG&gt;Authentication method&lt;/STRONG&gt;&lt;/TD&gt;
&lt;TD width="30%" height="47px"&gt;SAML&lt;/TD&gt;
&lt;TD width="60%" height="47px"&gt;The authentication enabled via auth0&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="10%" height="47px" style="background-color: ghostwhite;"&gt;&lt;STRONG&gt;SAML host URI&lt;/STRONG&gt;&lt;/TD&gt;
&lt;TD width="30%" height="47px" style="background-color: ghostwhite;"&gt;https://&lt;/TD&gt;
&lt;TD width="60%" height="47px" style="background-color: ghostwhite;"&gt;The Qlik Sense Server&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="10%" height="47px"&gt;&lt;STRONG&gt;SAML entity ID&lt;/STRONG&gt;&lt;/TD&gt;
&lt;TD width="30%" height="47px"&gt;https://.auth0.com&lt;/TD&gt;
&lt;TD width="60%" height="47px"&gt;This can be found in the metadata file downloaded from auth0 under entityID&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="10%" height="47px" style="background-color: ghostwhite;"&gt;&lt;STRONG&gt;SAML IdP metadata&lt;/STRONG&gt;&lt;/TD&gt;
&lt;TD width="30%" height="47px" style="background-color: ghostwhite;"&gt;Choose File: This is the xml file downloaded from Auth0&lt;/TD&gt;
&lt;TD width="60%" height="47px" style="background-color: ghostwhite;"&gt;The IdP metadata file downloaded from auth0&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="10%" height="47px"&gt;&lt;STRONG&gt;SAML attribute for user ID&lt;/STRONG&gt;&lt;/TD&gt;
&lt;TD width="30%" height="47px"&gt;See&amp;nbsp;&lt;A href="https://learn.microsoft.com/en-us/windows-server/identity/ad-fs/technical-reference/the-role-of-claims#:~:text=URI-,E%2DMail%20Address,http%3A//schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress,-Given%20Name" target="_blank" rel="noopener"&gt;Claim Types (learn.microsoft)&lt;/A&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD width="60%" height="47px"&gt;This is also found in the metadata file from auth0&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="10%" height="47px" style="background-color: ghostwhite;"&gt;&lt;STRONG&gt;SAML attribute for user directory&lt;/STRONG&gt;&lt;/TD&gt;
&lt;TD width="30%" height="47px" style="background-color: ghostwhite;"&gt;[Auth0]&lt;/TD&gt;
&lt;TD width="60%" height="47px" style="background-color: ghostwhite;"&gt;Directory name&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="10%" height="47px"&gt;&lt;STRONG&gt;SAML signing algorithm&lt;/STRONG&gt;&lt;/TD&gt;
&lt;TD width="30%" height="47px"&gt;SHA-1&lt;/TD&gt;
&lt;TD width="60%" height="47px"&gt;Used by auth0&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL start="3"&gt;
&lt;LI&gt;&lt;SPAN&gt;Under the Virtual Proxy's &lt;/SPAN&gt;&lt;STRONG style="font-family: inherit;"&gt;LOAD BALANCING&lt;/STRONG&gt;&lt;SPAN&gt; configuration, map the appropriate Server node or the proxy will not be usable.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;Click on &lt;/SPAN&gt;&lt;STRONG style="font-family: inherit;"&gt;Apply&lt;/STRONG&gt;&lt;SPAN&gt;, then go back into it and click on &lt;/SPAN&gt;&lt;STRONG style="font-family: inherit;"&gt;View Content&lt;/STRONG&gt;&lt;SPAN&gt; link under the &lt;/SPAN&gt;&lt;STRONG style="font-family: inherit;"&gt;SAML IdP metadata&lt;/STRONG&gt;&lt;SPAN&gt;. This is the auth0 IdP metadata that was uploaded to this Virtual Proxy settings.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;Go back to &lt;/SPAN&gt;&lt;STRONG style="font-family: inherit;"&gt;START &amp;gt; CONFIGURE SYSTEM &amp;gt; Virtual Proxies&lt;/STRONG&gt;&lt;SPAN&gt;, highlight the auth0 Virtual Proxy created and click on &lt;/SPAN&gt;&lt;STRONG style="font-family: inherit;"&gt;Download SP metadata&lt;/STRONG&gt;&lt;SPAN&gt;.&lt;/SPAN&gt;&lt;SPAN&gt; This is the Qlik Sense SP metadata.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;Open the Qlik Sense SP metadata with a browser (e.g: IE) and view it. Notice that the &lt;/SPAN&gt;&lt;SPAN&gt;Location=&lt;/SPAN&gt;&lt;SPAN&gt; URL under &lt;/SPAN&gt;&lt;SPAN&gt;AssertionConsumerService&lt;/SPAN&gt;&lt;SPAN&gt; should match what was included in the Auth0's setting &lt;/SPAN&gt;&lt;STRONG style="font-family: inherit;"&gt;Application Callback URL&lt;/STRONG&gt;&lt;SPAN&gt;.&lt;/SPAN&gt;&lt;SPAN&gt; This can be confirmed in the Auth0's site under &lt;/SPAN&gt;&lt;STRONG style="font-family: inherit;"&gt;Applications &amp;gt;&lt;/STRONG&gt;&lt;SPAN&gt; the created application &lt;/SPAN&gt;&lt;STRONG style="font-family: inherit;"&gt;&amp;gt; Settings &amp;gt; Application URIs &amp;gt; Allowed Callbacks URLs&lt;/STRONG&gt;&lt;SPAN&gt;.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;Test the authentication via the new SAML Virtual Proxy by going to &lt;SPAN&gt;&lt;A href="https://&amp;lt;Qlik" target="test_blank"&gt;https://&amp;lt;Qlik&lt;/A&gt; Sense FQDN&amp;gt;/&amp;lt;prefix&amp;gt;/qmc. (&lt;/SPAN&gt;&lt;SPAN&gt;e.g:&lt;/SPAN&gt;&lt;SPAN&gt; https//qlikserver2.domain.local/auth0/qmc)&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;&lt;FONT color="#339966"&gt;Related Content:&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/H3&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://community.qlik.com/t5/Knowledge/Qlik-Sense-What-are-SAML-attributes/ta-p/1717415" target="_blank" rel="noopener"&gt;Qlik Sense: What are SAML attributes&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://community.qlik.com/t5/Qlik-Support-Knowledge-Base/Quick-Guide-to-installing-ADFS-for-testing-SAML/ta-p/1710427" target="_blank" rel="noopener"&gt;Quick Guide to installing ADFS for testing SAML&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Thu, 25 Jan 2024 09:30:34 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Official-Support-Articles/Example-auth0-SAML-setup-with-Qlik-Sense-Enterprise-on-Windows/ta-p/1713277</guid>
      <dc:creator>Andre_Sostizzo</dc:creator>
      <dc:date>2024-01-25T09:30:34Z</dc:date>
    </item>
    <item>
      <title>Re: Example auth0 SAML setup with Qlik Sense Enterprise on Windows</title>
      <link>https://community.qlik.com/t5/Official-Support-Articles/Example-auth0-SAML-setup-with-Qlik-Sense-Enterprise-on-Windows/tac-p/2096217#M9729</link>
      <description>&lt;P&gt;Wonder full, i have a question, when user makes logout, is not redirected to login page again, we wants this option&lt;/P&gt;</description>
      <pubDate>Fri, 21 Jul 2023 16:02:40 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Official-Support-Articles/Example-auth0-SAML-setup-with-Qlik-Sense-Enterprise-on-Windows/tac-p/2096217#M9729</guid>
      <dc:creator>marcos_herrera</dc:creator>
      <dc:date>2023-07-21T16:02:40Z</dc:date>
    </item>
    <item>
      <title>Re: Example auth0 SAML setup with Qlik Sense Enterprise on Windows</title>
      <link>https://community.qlik.com/t5/Official-Support-Articles/Example-auth0-SAML-setup-with-Qlik-Sense-Enterprise-on-Windows/tac-p/2096898#M9752</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.qlik.com/t5/user/viewprofilepage/user-id/235"&gt;@marcos_herrera&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;SPAN class="ui-provider fz b c d e f g h i j k l m n o p q r s t u v w x y z ab ac ae af ag ah ai aj ak"&gt;If SAML single logout is turned on, then the expected behaviour would be:&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;User clicks "log out"&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;They get to the Qlik Sense page saying "You have been logged out" with a "Login" button&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;If they click on the "Login" button then they should be redirected to the Auth0 authentication page if single logout was turned on&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;If not, then the logout did not kill the Auth0 session, so they will just seamlessly get logged in again to Qlik Sense&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN&gt;For more information about this feature, see &lt;A href="https://help.qlik.com/en-US/sense-admin/Subsystems/DeployAdministerQSE/Content/Sense_DeployAdminister/QSEoW/Administer_QSEoW/Managing_QSEoW/SAML-single-logout.htm" target="_blank" rel="noopener"&gt;SAML single logout&lt;/A&gt;.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;SPAN&gt;If you need further assistance on how to implement the above, then our professional services can be engaged for direct assistance with this customization. See&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://community.qlik.com/t5/Official-Support-Articles/How-and-when-to-contact-Qlik-s-Professional-Services-and/ta-p/1714936" target="_blank" rel="noopener"&gt;Professional Services&lt;/A&gt;&lt;SPAN&gt;. Alternatively, you can reach out to our larger userbase with your customization requirement in the&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://community.qlik.com/t5/Integration-Extension-APIs/bd-p/qlik-sense-integration-extension-api" target="_blank" rel="noopener"&gt;Integrations forum&lt;/A&gt;&lt;SPAN&gt;.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;SPAN&gt;All the best,&lt;BR /&gt;Sonja&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;LI-WRAPPER&gt;&lt;/LI-WRAPPER&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 25 Jul 2023 09:00:46 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Official-Support-Articles/Example-auth0-SAML-setup-with-Qlik-Sense-Enterprise-on-Windows/tac-p/2096898#M9752</guid>
      <dc:creator>Sonja_Bauernfeind</dc:creator>
      <dc:date>2023-07-25T09:00:46Z</dc:date>
    </item>
    <item>
      <title>Re: Example auth0 SAML setup with Qlik Sense Enterprise on Windows</title>
      <link>https://community.qlik.com/t5/Official-Support-Articles/Example-auth0-SAML-setup-with-Qlik-Sense-Enterprise-on-Windows/tac-p/2160015#M11089</link>
      <description>&lt;P&gt;auth0 no longer uses Rules for new implementations - instead Actions are used. There is information on the auth0 website about how to migrate from Rules to Actions.&amp;nbsp; Has anyone done this?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;Paul Selous&lt;/P&gt;</description>
      <pubDate>Wed, 10 Jan 2024 12:34:14 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Official-Support-Articles/Example-auth0-SAML-setup-with-Qlik-Sense-Enterprise-on-Windows/tac-p/2160015#M11089</guid>
      <dc:creator>paulselousyoriz</dc:creator>
      <dc:date>2024-01-10T12:34:14Z</dc:date>
    </item>
    <item>
      <title>Re: Example auth0 SAML setup with Qlik Sense Enterprise on Windows</title>
      <link>https://community.qlik.com/t5/Official-Support-Articles/Example-auth0-SAML-setup-with-Qlik-Sense-Enterprise-on-Windows/tac-p/2163310#M11176</link>
      <description>&lt;P&gt;Agreed, Paul!&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I'd love to see this updated to get groups from Auth0 with Flows and Actions instead of Rules.&lt;/P&gt;
&lt;P&gt;My claim is presenting&amp;nbsp; as a source but it's not getting mapped in. I put it in as ~1https:~1~1qlik.com/groups. I see it in&amp;nbsp;api/v1/diagnose-claims but I don't see it when I look at&amp;nbsp;us.auth0.com/.well-known/openid-configuration. So I'm not sure where things are going wrong.&lt;/P&gt;</description>
      <pubDate>Fri, 19 Jan 2024 13:38:35 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Official-Support-Articles/Example-auth0-SAML-setup-with-Qlik-Sense-Enterprise-on-Windows/tac-p/2163310#M11176</guid>
      <dc:creator>jfitz_chicago</dc:creator>
      <dc:date>2024-01-19T13:38:35Z</dc:date>
    </item>
    <item>
      <title>Re: Example auth0 SAML setup with Qlik Sense Enterprise on Windows</title>
      <link>https://community.qlik.com/t5/Official-Support-Articles/Example-auth0-SAML-setup-with-Qlik-Sense-Enterprise-on-Windows/tac-p/2163852#M11185</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.qlik.com/t5/user/viewprofilepage/user-id/6276"&gt;@jfitz_chicago&lt;/a&gt;&amp;nbsp;and&amp;nbsp;&lt;a href="https://community.qlik.com/t5/user/viewprofilepage/user-id/52173"&gt;@paulselousyoriz&lt;/a&gt;&amp;nbsp;I'm looking into having this article reviewed. Thank you for expressing your interest.&lt;/P&gt;
&lt;P&gt;All the best,&lt;BR /&gt;Sonja&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 22 Jan 2024 12:12:26 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Official-Support-Articles/Example-auth0-SAML-setup-with-Qlik-Sense-Enterprise-on-Windows/tac-p/2163852#M11185</guid>
      <dc:creator>Sonja_Bauernfeind</dc:creator>
      <dc:date>2024-01-22T12:12:26Z</dc:date>
    </item>
    <item>
      <title>Re: Example auth0 SAML setup with Qlik Sense Enterprise on Windows</title>
      <link>https://community.qlik.com/t5/Official-Support-Articles/Example-auth0-SAML-setup-with-Qlik-Sense-Enterprise-on-Windows/tac-p/2472126#M14309</link>
      <description>&lt;P&gt;Hello, is there any update on the Auth0 actions?&lt;/P&gt;</description>
      <pubDate>Mon, 22 Jul 2024 13:43:32 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Official-Support-Articles/Example-auth0-SAML-setup-with-Qlik-Sense-Enterprise-on-Windows/tac-p/2472126#M14309</guid>
      <dc:creator>Wolfgang_K</dc:creator>
      <dc:date>2024-07-22T13:43:32Z</dc:date>
    </item>
  </channel>
</rss>

