website/integrations/media/ironclad/index.mdx
Ironclad is a contract lifecycle management (CLM) platform that gives business and legal teams an easy-to-use platform with AI-powered tools to handle every aspect of the contract lifecycle.
The following placeholders are used in this guide:
authentik.company is the FQDN of the authentik installation.:::info This documentation lists only the settings that you need to change from their default values. Be aware that any changes other than those explicitly mentioned in this guide could cause issues accessing your application. :::
To support the integration of Ironclad with authentik, you need to create three property mappings and an application/provider pair in authentik.
Ironclad requires both a first and last name for each user, but by default, authentik only provides a full name as a single string. Ironclad also requires the email attribute in a specific format. Therefore, property mappings must be created to provide the email, first name, and last name to Ironclad.
Log in to authentik as an administrator and open the authentik Admin interface.
Navigate to Customization > Property Mappings, click Create, select SAML Provider Property Mappings, and then click Next.
Configure the first mapping for the user's first name:
Name: firstName
SAML Attribute Name: firstName
Expression:
return request.user.name.rsplit(" ", 1)[0]
Click Finish to save. Then, repeat the process to create a mapping for the user's last name:
Name: lastName
SAML Attribute Name: lastName
Expression:
return request.user.name.rsplit(" ", 1)[-1]
Click Finish to save. Finally, repeat the process to create a mapping for the user's email address:
Name: email
SAML Attribute Name: email
Expression:
return request.user.email
Click Finish.
Log in to authentik as an administrator and open the authentik Admin interface.
Navigate to Applications > Applications and click Create with Provider to create an application and provider pair. (Alternatively you can first create a provider separately, then create the application and connect it with the provider.)
Application: provide a descriptive name, an optional group for the type of application, the policy engine mode, and optional UI settings. Note the slug value because it will be required later.
Choose a Provider type: select SAML Provider as the provider type.
Configure the Provider: provide a name (or accept the auto-provided name), the authorization flow to use for this provider, and the following required configurations.
https://temp.tempPost.firstName, lastName, and email property mappings that were created in the previous section.Configure Bindings (optional): you can create a binding (policy, group, or user) to manage the listing and access to applications on a user's My applications page.
Click Submit to save the new application and provider.
https://ironcladapp.com/saml/<customer-ID>/callback).na1.ironcladapp.com).https://authentik.company/application/saml/<application-slug>/sso/binding/redirect/.:::info
SSO login must be specifically enabled on Ironclad user accounts. SSO login on the original Ironclad administrator account can only be enabled by Ironclad support. To request this, contact them at [email protected].
For new user accounts, SSO login can be selected when creating the account. :::
To confirm that authentik is properly configured with Ironclad, log out and log back in via the Ironclad Sign In page. Enter the email address of an Ironclad SSO-enabled account, click Continue, and then Sign in. You should be redirected to authentik to log in, and if successful, you should then be redirected to the Ironclad dashboard.