Overview #
DnXT Suite supports multiple authentication methods to integrate with your organization’s identity infrastructure. Whether you use local accounts managed entirely within DnXT, an LDAP/Active Directory server, or a federated Single Sign-On (SSO) provider like Azure AD, Okta, or any SAML 2.0 compliant identity provider, DnXT can accommodate your security requirements.
This guide covers how to configure each authentication method in the SSO Configuration tab within DnXT Administrator’s Configurations module, as well as how authentication types interact with user creation and password management.
Local — Credentials stored and managed in DnXT. Best for small teams or standalone deployments.
LDAP — Credentials validated against an external LDAP/Active Directory server. Best for organizations with existing directory infrastructure.
SSO (SAML/OAuth) — Credentials managed by a federated identity provider. Best for enterprise environments with centralized identity management.
Accessing SSO Configuration #
- Log in to DnXT Administrator.
- Click Configurations in the left sidebar.
- Select the SSO Configuration tab.
SSO Configuration Interface #
The SSO Configuration tab displays a list of property name/value pairs. Each property controls a specific aspect of the authentication flow. Properties are organized by authentication protocol and provider type.
Configuration Properties #
The configuration is structured as a key-value editor. Common properties include:
| Property Name | Description |
|---|---|
| sso.enabled | Enable or disable SSO authentication (true/false) |
| sso.protocol | The authentication protocol (SAML, OAuth2, OpenID Connect) |
| sso.provider.name | Display name of the identity provider |
| sso.idp.entity.id | The Identity Provider’s Entity ID / Issuer URL |
| sso.idp.sso.url | The SSO login endpoint URL provided by your IdP |
| sso.idp.slo.url | The Single Logout (SLO) endpoint URL (optional) |
| sso.idp.certificate | The IdP’s X.509 signing certificate (PEM format) |
| sso.sp.entity.id | The Service Provider Entity ID (DnXT’s identifier) |
| sso.sp.acs.url | The Assertion Consumer Service URL (DnXT’s callback URL) |
| sso.attribute.username | The SAML attribute name that contains the username |
| sso.attribute.email | The SAML attribute name that contains the email address |
| sso.attribute.federated.id | The SAML attribute name that contains the federated user ID |
Modifying Properties #
- Locate the property you want to change in the list.
- Click the Value field to edit it.
- Enter the new value.
- Click Save to apply the changes.
Setting Up SAML-Based SSO #
SAML (Security Assertion Markup Language) is the most common protocol for enterprise SSO. Follow these steps to configure SAML SSO with providers like Azure AD, Okta, ADFS, or OneLogin.
Step 1: Register DnXT in Your Identity Provider #
- Log in to your identity provider’s administration console (e.g., Azure AD Portal, Okta Admin).
- Create a new Enterprise Application or SAML App Integration.
- Set the Entity ID (Identifier) to the value you will use in
sso.sp.entity.id(e.g.,https://yourcompany.dnxtsolutions.com). - Set the ACS URL (Reply URL) to your DnXT SSO callback URL (e.g.,
https://yourcompany.dnxtsolutions.com/api/auth/sso/callback). - Configure the SAML attributes/claims to include username, email, and a unique federated ID.
- Download the IdP metadata or note the Entity ID, SSO URL, and signing certificate.
Step 2: Configure DnXT SSO Properties #
- Navigate to Configurations > SSO Configuration.
- Set
sso.enabledto true. - Set
sso.protocolto SAML. - Enter the IdP Entity ID in
sso.idp.entity.id. - Enter the SSO Login URL in
sso.idp.sso.url. - Paste the IdP signing certificate (PEM format) in
sso.idp.certificate. - Set
sso.sp.entity.idto the Entity ID you registered in your IdP. - Set
sso.sp.acs.urlto your DnXT callback URL. - Map the SAML attribute names to DnXT fields using
sso.attribute.username,sso.attribute.email, andsso.attribute.federated.id. - Click Save.
Step 3: Create SSO User Accounts #
- Navigate to User Management > Users.
- Click Add and select SSO as the user type.
- Enter the user’s details including the Federated ID that matches the claim value from the IdP.
- Assign a role and module access.
- Click Save.
Step 4: Test the SSO Flow #
- Open a new browser window (or incognito/private window).
- Navigate to your DnXT login page.
- Click the SSO Login button (if available) or navigate directly to the SSO endpoint.
- You should be redirected to your identity provider’s login page.
- Authenticate with your IdP credentials.
- After successful authentication, you should be redirected back to DnXT and logged in automatically.
Setting Up LDAP Authentication #
LDAP (Lightweight Directory Access Protocol) allows DnXT to validate user credentials against your organization’s Active Directory or LDAP server.
LDAP Configuration Properties #
| Property | Description | Example |
|---|---|---|
| ldap.enabled | Enable LDAP authentication | true |
| ldap.url | LDAP server URL | ldaps://ad.yourcompany.com:636 |
| ldap.base.dn | Base Distinguished Name for user searches | DC=yourcompany,DC=com |
| ldap.bind.dn | Service account DN for binding | CN=svc-dnxt,OU=ServiceAccounts,DC=yourcompany,DC=com |
| ldap.bind.password | Service account password | (masked) |
| ldap.user.filter | LDAP search filter for users | (sAMAccountName={0}) |
| ldap.domain | Active Directory domain name | YOURCOMPANY |
Configuring LDAP #
- Navigate to Configurations > SSO Configuration.
- Set
ldap.enabledto true. - Enter your LDAP server URL in
ldap.url. Useldaps://for secure connections. - Set the
ldap.base.dnto the root of your user tree. - Provide the service account credentials in
ldap.bind.dnandldap.bind.password. - Set the
ldap.user.filterto match your directory structure. - Click Save.
Creating LDAP User Accounts in DnXT #
After configuring the LDAP connection, you must create user accounts in DnXT for each LDAP user who needs access:
- Navigate to User Management > Users.
- Click Add and select LDAP as the user type.
- Enter the Username (must match the LDAP username).
- Enter the user’s Distinguished Name (DN) from the directory.
- Enter the Domain name.
- Assign a role and module access.
- Click Save.
When the user logs in, DnXT will validate their credentials against the LDAP server rather than a local password store.
Local Authentication #
Local authentication is the default method where user credentials are stored and managed entirely within DnXT. No external identity infrastructure is required.
How Local Authentication Works #
- An administrator creates a user account with the Local user type in User Management.
- The user receives an invitation email (if SMTP is configured) or is given a temporary password.
- The user logs in at the DnXT login screen with their username and password.
- Passwords are validated against the configured Password Configuration policies.
When to Use Local Authentication #
- Small teams without existing LDAP or SSO infrastructure
- External consultants or contractors who are not in your corporate directory
- Development and testing environments
- Fallback administrator accounts when SSO is the primary method
Mixed Authentication Environments #
DnXT supports running multiple authentication methods simultaneously. For example, you can have SSO users, LDAP users, and local users all active in the same tenant. The user type is determined at the account level — each user account specifies whether it authenticates via Local, LDAP, or SSO.
Authentication Flow by User Type #
| User Type | Login Method | Password Managed By | Password Policy Applies? |
|---|---|---|---|
| Local | Username + password on DnXT login screen | DnXT | Yes |
| LDAP | Username + password validated against LDAP | LDAP/Active Directory | No (LDAP policy applies) |
| SSO | Redirect to identity provider | Identity Provider | No (IdP policy applies) |
Two-Factor Authentication (2FA) #
DnXT supports two-factor authentication for enhanced security. 2FA can be enabled on a per-user basis in the user’s Security settings (see User Management). When 2FA is enabled, the user must provide a second verification factor (typically a time-based one-time password from an authenticator app) after entering their primary credentials.
Troubleshooting Authentication Issues #
SSO Login Redirects But Does Not Complete #
- Verify that the ACS URL in your IdP matches the value in
sso.sp.acs.urlexactly - Confirm the IdP signing certificate is current and correctly pasted in
sso.idp.certificate - Check that the user’s Federated ID in DnXT matches the claim value from the IdP
LDAP Users Cannot Log In #
- Verify the
ldap.urlis reachable from the DnXT server - Confirm the service account (
ldap.bind.dn) credentials are correct - Check that the
ldap.user.filtermatches your directory schema - Ensure the user’s DN in DnXT matches their actual DN in the directory
Local User Password Reset Not Working #
- Verify Mail Configuration SMTP settings are correct
- Check that the user has a valid email address in their profile
- Review the Audit Trail for failed email delivery events
FAQ #
Can I switch a user from Local to SSO authentication? #
You would need to create a new SSO user account and deactivate the old local account. The user type cannot be changed on an existing account because the authentication mechanism and required fields differ.
Does DnXT support OAuth 2.0? #
Yes. DnXT supports OAuth 2.0 and OpenID Connect in addition to SAML 2.0. Set the sso.protocol property accordingly and configure the OAuth-specific properties (client ID, client secret, authorization endpoint, token endpoint).
Can SSO users still log in with a password? #
SSO users authenticate exclusively through their identity provider. They do not have a local password in DnXT. If the identity provider is unavailable, SSO users cannot log in.
How do I set up SSO with Azure Active Directory? #
Follow the SAML SSO setup steps in this guide. In Azure AD, create an Enterprise Application, configure SAML SSO with the DnXT Entity ID and ACS URL, and download the Federation Metadata XML or note the individual values. Then enter those values in the DnXT SSO Configuration.