What are the technical details of the ProctorExam SAML2 service provider?
Field | Value |
entityID |
https://proctorexam.com |
Metadata URL | https://sso.proctorexam.com/metadata |
Callback URL |
https://sso.proctorexam.com/callback |
When the SSO feature is released, will the existing login method stop working?
Nothing will change for existing users as their login method will default to their current ProctorExam username/password. Customers can switch to using SSO as a login method on their own schedule by using the new options in the institute settings.
How can an SSO configuration be tested before 'going live'?
It is possible to configure a new Identity Provider and test it with a test user (change that users authentication method to the new IdP). Once the IdP is tested end to end then all users can be switched to the IdP. It is also possible to switch a users authentication method back to the password method.
Which data attribute/claim returned by the Identity Provider does ProctorExam use to match the user in ProctorExam?
User matching is done on the email address that is returned by the Identity Provider.
Will the ProctorExam SSO feature support Multi-factor authentication (MFA)?
ProctorExam does not provide an MFA feature directly. However when using the SSO functionality, ProctorExam delegates the authentication process to the customer's own Identity Provider (IdP), such as Okta. This means that when logging into ProctorExam through SSO, the actual verification of user credentials, including MFA, is managed by your chosen IdP. If your IdP is configured to use MFA, this additional security layer will automatically be in effect when accessing ProctorExam.
In essence, while ProctorExam does not internally handle MFA, the integration with SSO enables you to utilize your existing MFA methods. This approach not only enhances security but also allows for a seamless integration with your organization's established security protocols.
Comments
0 comments
Article is closed for comments.