Prerequisite

  • A working installation of Mividas Core and Portal.
  • Needed metadata, either IDP Metadata URL or the metadata in XML format.
  • The claims that are listed under point 1.8 below.
  • Mividas Identify installed an onboarded.

Configuration

1. SAML configuration

  1. Access the admin area by going to https://[Identify FQDN]/admin and log in as an administrator.
  2. Click the BACKEND tab to open the backend admin interface.
  3. Next to “Saml configurations”, click Add.
  4. Enter a name for your configuration. E.g. saml.
  5. Enter the “Entity id”, this value should be the same as the Entity ID in your IDP. You may read Configure Microsoft ADFS for SAML/SSO to see detailed steps for configuring this in Microsoft ADFS.
  6. Enter the “Remote IDP metadata XML” to get dynamic idp Metadata.

    Example for Microsoft ADFS: https://{fqdn_ms_adfs}/FederationMetadata/2007-06/FederationMetadata.xml

    If you don’t have access to the IDP Metadata URL, you can paste the metadata in the “Local/offline IDP metadata XML” field instead.
  7. Under “Auth type, select e-ID login
  8. Enter claims as agreed with your IDP technical team.
    • Email claim – Enter the attribute containing the email-address.
    • First name claim – Enter the attribute containing the First name.
    • Last name claim – Enter the attribute containing the Last name.
    • Full name claim – Optional, and only needed if first- and last name is not provided.
    • Identification claim – Needed if you want to validate identity number, personal identification number, email, or other.
  9. Click Save .

2. Configure a new authentication provider

  1. Stay within the backend admin area. If you left, you can reach it by going to https://[Identify FQDN]/admin and clicking BACKEND.
  2. Next to “Auth providers”, click Add.
  3. In the Backend dropdown, select saml.
  4. Enter the same “System configuration name” as specified in step #4 in the above topic SAML configuration (we used saml in this example).
  5. Check the “Enabled” checkbox.
  6. Click Save .

3. Connect Mividas Identify to Mividas Meeting Portal

If Mividas Identify is already connected to Mividas Meeting Portal, you can skip these steps.

Mividas Identify settings

  1. Log in to the Mividas Installer used for your Mividas Identify installation. E.g. https://ext-installer.example.com:8999
  2. On the start page, find Mividas Identify och click Details .
  3. Click Configure and then Portal API settings.
  4. If the Mividas Identify installation is on the same Mividas Installer as the Mividas Meeting Portal, leave External Mividas Portal server domain name blank. If they are on separate Mividas Installers, enter the FQDN of the Mividas Meeting Portal.
  5. Copy the API Key, to be pasted in the next steps when configuring the Mividas Meeting Portal.
  6. If you made any changes, click Save followed by Deploy changes .

Mividas Meeting Portal settings

  1. Go to backend admin in Mividas Meeting Portal: https://[Portal FQDN]/admin and log in with an administrator account.
  2. Check Secure meetings settings. If none is available, click Add. If one is already available, click on it.
  3. Connect portal url: Enter the FQDN to Mividas Identify.
  4. Make sure Enable is checked.
  5. API key: Paste the API key that you copied from Mividas Identify.
  6. Click Save .
On This Page
    © Mividas Video Solutions AB 2025