<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>single sign on Archives - MIDAS - Room Booking System | Blog</title>
	<atom:link href="https://mid.as/blog/tag/single-sign-on/feed/" rel="self" type="application/rss+xml" />
	<link></link>
	<description>...Making your facilities work for you!</description>
	<lastBuildDate>Mon, 04 Aug 2025 13:22:54 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
	<item>
		<title>SAML 2.0 integration comes to MIDAS</title>
		<link>https://mid.as/blog/saml-2-0-integration-comes-to-midas/</link>
		
		<dc:creator><![CDATA[midas]]></dc:creator>
		<pubDate>Mon, 04 Aug 2025 10:50:03 +0000</pubDate>
				<category><![CDATA[Development]]></category>
		<category><![CDATA[active directory]]></category>
		<category><![CDATA[SAML]]></category>
		<category><![CDATA[single sign on]]></category>
		<category><![CDATA[v4.40]]></category>
		<guid isPermaLink="false">https://mid.as/blog/?p=5820</guid>

					<description><![CDATA[<p>SAML 2.0, or Security Assertion Markup Language 2.0, is an open standard that enables cross-domain single sign-on (SSO). It&#8217;s a process which allows one system (the &#8220;Service Provider&#8221;) to trust the authentication performed by another system (the &#8220;Identity Provider&#8221;). Essentially, it lets users authenticate once and then access multiple services without needing to re-enter their [&#8230;]</p>
<p>The post <a href="https://mid.as/blog/saml-2-0-integration-comes-to-midas/">SAML 2.0 integration comes to MIDAS</a> appeared first on <a href="https://mid.as/blog">MIDAS - Room Booking System | Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>SAML 2.0, or Security Assertion Markup Language 2.0, is an open standard that enables cross-domain single sign-on (SSO). It&#8217;s a process which allows one system (the &#8220;Service Provider&#8221;) to trust the authentication performed by another system (the &#8220;Identity Provider&#8221;). Essentially, it lets users authenticate once and then access multiple services without needing to re-enter their credentials every time.</p>



<h2 class="wp-block-heading">Here&#8217;s how it works..</h2>


<div class="wp-block-image">
<figure class="aligncenter size-full"><img fetchpriority="high" decoding="async" width="750" height="280" src="https://mid.as/blog/wp-content/uploads/2025/08/saml-authentication-process.png" alt="SAML 2.0 Authentication Process" class="wp-image-5824" srcset="https://mid.as/blog/wp-content/uploads/2025/08/saml-authentication-process.png 750w, https://mid.as/blog/wp-content/uploads/2025/08/saml-authentication-process-300x112.png 300w" sizes="(max-width: 750px) 100vw, 750px" /><figcaption class="wp-element-caption">SAML 2.0 Authentication Process</figcaption></figure>
</div>


<p>MIDAS has long supported SSO via <a href="https://mid.as/active-directory-integration">Active Directory (LDAP) integration</a>. From v4.40 however, our booking systems now also support seamless Single Sign-On (SSO) through SAML 2.0 Identity Providers. This allows users to be automatically logged in whenever they access MIDAS.</p>



<p>Unlike Active Directory integration &#8211; which was only available to those running <a href="https://mid.as/glossary/self-hosted-software">self-hosted</a> MIDAS booking systems, SAML 2.0 integration is available to both self-hosted and <a href="https://mid.as/glossary/cloud-hosted-software">cloud-hosted systems</a>.</p>



<h2 class="wp-block-heading">What you&#8217;ll need</h2>



<p>All you&#8217;ll need is a MIDAS system licensed for &#8220;unlimited&#8221; users. If you need to upgrade your license, you can do so at <a href="https://mid.as/upgrade">mid.as/upgrade</a>.</p>



<p>You&#8217;ll then be able to configure your MIDAS system with your chosen SAML 2.0 Identity Provider.</p>



<p>Popular SAML 2.0 identity providers include (but are not limited to):</p>



<ul class="wp-block-list">
<li><a href="https://auth0.com/">Auth0</a></li>



<li><a href="https://learn.microsoft.com/en-us/windows-server/identity/ad-fs/ad-fs-overview">Microsoft ADFS</a></li>



<li><a href="https://www.microsoft.com/en-gb/security/business/identity-access/microsoft-entra-id">Microsoft Entra ID</a> (formerly Azure AD)</li>



<li><a href="https://www.okta.com/">Okta</a></li>



<li><a href="https://www.onelogin.com/">OneLogin</a></li>



<li><a href="https://www.pingidentity.com/en/product/pingfederate.html">PingFederate</a></li>



<li><a href="https://www.pingidentity.com/en/capability/single-sign-on.html">PingOne SSO</a></li>



<li><a href="https://www.shibboleth.net/about-us/the-shibboleth-project/">Shibboleth</a></li>
</ul>



<h2 class="wp-block-heading">Testing SAML 2.0 Integration</h2>



<p>We&#8217;ve produced a handy &#8220;<a href="https://mid.as/saml-integration/saml-test">SAML Test Tool</a>&#8221; that you can use to test integration between your MIDAS  booking system and your chosen SAML 2.0 Identity Provider.</p>



<p>To use this tool, you&#8217;ll need to enter some data provided by your Identity Provider, and generate some data for your MIDAS system to encrypt and authenticate data between MIDAS and your Identity Provider. The SAML Test Tool will then verify that it can successfully communicate with your Identity Provider.</p>



<h2 class="wp-block-heading">Configuration</h2>



<p>After successfully verifying authentication with your SAML 2.0 Identity Provider using our aforementioned SAML Test Tool, you&#8217;re then ready to configure your MIDAS booking system for single sign-on.</p>


<div class="wp-block-image">
<figure class="aligncenter size-large"><img decoding="async" width="842" height="1024" src="https://mid.as/blog/wp-content/uploads/2025/08/saml-settings-842x1024.png" alt="SAML 2.0 settings in MIDAS" class="wp-image-5825" srcset="https://mid.as/blog/wp-content/uploads/2025/08/saml-settings-842x1024.png 842w, https://mid.as/blog/wp-content/uploads/2025/08/saml-settings-247x300.png 247w, https://mid.as/blog/wp-content/uploads/2025/08/saml-settings-768x934.png 768w, https://mid.as/blog/wp-content/uploads/2025/08/saml-settings.png 1010w" sizes="(max-width: 842px) 100vw, 842px" /><figcaption class="wp-element-caption">SAML 2.0 settings in MIDAS</figcaption></figure>
</div>


<p>These settings may be found via MIDAS Admin Options → Manage Users &amp; Permissions → Single Sign-On (SSO). Here you&#8217;ll be able to use modified Identity Provider settings from the SAML Test Tool, as well as Service Provider settings from the tool too. Finally, you choose which group of permissions user&#8217;s authenticating via your SAML 2.0 Identity Provider should inherit.</p>



<h2 class="wp-block-heading">Find out more&#8230;</h2>



<p>Complete documentation for SAML 2.0 integration with MIDAS is available at <a href="https://mid.as/saml-integration">mid.as/saml-integration</a>.</p>



<p>Please Note: SAML 2.0 integration is currently in &#8220;beta&#8221;, and so we <a href="https://mid.as/contact">want your feedback</a> if you encounter any issues. </p>
<p>The post <a href="https://mid.as/blog/saml-2-0-integration-comes-to-midas/">SAML 2.0 integration comes to MIDAS</a> appeared first on <a href="https://mid.as/blog">MIDAS - Room Booking System | Blog</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Active Directory Integration</title>
		<link>https://mid.as/blog/active-directory-integration/</link>
					<comments>https://mid.as/blog/active-directory-integration/#respond</comments>
		
		<dc:creator><![CDATA[midas]]></dc:creator>
		<pubDate>Tue, 18 Mar 2014 13:34:20 +0000</pubDate>
				<category><![CDATA[Development]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[active directory]]></category>
		<category><![CDATA[LDAP]]></category>
		<category><![CDATA[single sign on]]></category>
		<category><![CDATA[v4.06]]></category>
		<guid isPermaLink="false">http://mid.as/blog/?p=1093</guid>

					<description><![CDATA[<p>The most popular suggestion on our Feature Request page in recent times has been a desire for integration between MIDAS and an Active Directory allowing single sign-on to MIDAS using a user&#8217;s current system credentials. We have been working to bring such integration to MIDAS for some time, and we are now pleased to announce [&#8230;]</p>
<p>The post <a href="https://mid.as/blog/active-directory-integration/">Active Directory Integration</a> appeared first on <a href="https://mid.as/blog">MIDAS - Room Booking System | Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p><img decoding="async" style="width: 300px; height: 300px; float: right; margin-left: 20px;" src="//mid.as/blog/wp-content/uploads/2014/03/active-directory.png" alt="Room Scheduling Software with Active Directory Integration">The most popular suggestion on our <a href="//mid.as/featurerequest">Feature Request</a> page in recent times has been a desire for integration between MIDAS and an Active Directory allowing <a class="dfn" href="https://mid.as/glossary/sso">single sign-on</a> to MIDAS using a user&#8217;s current system credentials.</p>



<p>We have been working to bring such integration to MIDAS for some time, and we are now pleased to announce that integration with an <a href="https://mid.as/glossary/active-directory" class="dfn">Active Directory</a> will be possible starting with our forthcoming update to MIDAS, v4.06.</p>



<p>So, instead of a user having to log in twice (once to their computer, and then again when they open MIDAS), MIDAS can instead authenticate against your organization&#8217;s Active Directory, meaning users logged onto your network can simply open MIDAS and be seamlessly logged in each time!</p>



<p>Please Note: Active Directory integration will only be available if you&#8217;re running MIDAS on your own server (our &#8220;self-hosted&#8221; edition), and your MIDAS is licensed for &#8220;Unlimited&#8221; users.</p>



<p>We&#8217;re currently looking for beta testes who meet the above requirements (i.e. currently running a &#8220;self hosted&#8221; MIDAS with &#8220;Unlimited&#8221; users) who would be interested in testing integration between MIDAS and their Active Directory. If this is you, please <a href="//mid.as/contact">contact us</a> for more information.</p>



<p>Also, if you&#8217;re interested in Active Directory integration when it becomes publicly available with MIDAS v4.06, you can get a head start by making sure your infrastructure is ready with our <a href="//mid.as/active-directory-integration/integration-test">Active Directory Integration Test Tool</a> and by referring to the dedicated <a href="//mid.as/active-directory-integration">Active Directory Integration Documentation</a>.</p>
<p>The post <a href="https://mid.as/blog/active-directory-integration/">Active Directory Integration</a> appeared first on <a href="https://mid.as/blog">MIDAS - Room Booking System | Blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://mid.as/blog/active-directory-integration/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>

<!--
Performance optimized by W3 Total Cache. Learn more: https://www.boldgrid.com/w3-total-cache/?utm_source=w3tc&utm_medium=footer_comment&utm_campaign=free_plugin

Page Caching using Disk: Enhanced 
Lazy Loading (feed)
Database Caching 22/33 queries in 0.004 seconds using Disk

Served from: mid.as @ 2026-04-02 10:45:59 by W3 Total Cache
-->