Table of Contents |
---|
How to access:
Login with your credentials
Select
your tenantSelectUsers
Manually create Cobundu users in Studio
...
UID (Unique ID within Studio) and sumorea e-mail address will be created using
(short) tenant
first name
last name
Login to Cobundu (Studio, Go, touchpoints) is possible via either
UID
sumorea e-mail address
e-mail address
Upload of multiple users at once (batch upload) is possible using the import-functionality. Check Cobundu User Management as example:
all fields are mandatory (incl default password to start with)
document may not contain hyperlinks (so better to set e-mail address as text)
...
Status | ||
---|---|---|
|
Automatic creation of Cobundu users
...
Prerequisites for Automatic creation of Cobundu users, see section "Cobundu SSO".
Status | ||
---|---|---|
|
Cobundu SSO
Cobundu SSO is available for Go.cobundu.com, Studio.cobundu.com and Workplace App.
Prerequisites for Cobundu SSO
IWMS account for user must exist
Ideally, an HR interface takes care of automatic creation of IWMS users
In case the logged in user doesn’t exist in IWMS, the user will not be able to use any IWMS-dependant features like making reservations.
Identity Provider Mapping (receiving following attributes from the identity provider: "IWMS login ID", "First Name", "Last Name" and "E-Mail“)
In case the “IWMS login ID” attribute is not correctly mapped, the user will not be able to use any IWMS-dependant features like making reservations.
(optional) Mapping between Active Directory account groups with Cobundu roles
How is it set up?
Cobundu supports SAML 2.0 protocol which is the industry standard among all up-to-date integrations. See SSO SAML 2.0 for a general understanding of how SSO works.
The SSO configuration from IWMS cannot be re-used on Cobundu. These are 2 separated apps from the Identity Provider perspective, and each requires an independent SSO federation setup.
...
We have now added a way to overcome this by providing a mapping table in Studio, where one can map the Active Directory account groups with Cobundu roles:
If a user logs in using SSO and has no Cobundu account yet
The user will be automatically created
Based upon the AD Account Group ID passed via metadata, the user will be created and assigned a Cobundu role as defined in the role mapping
If a user logs in using SSO and already has a Cobundu account
Based upon the AD Account Group ID passed via metadata, the user will be assigned a Cobundu role as defined in the role mapping
This Feature can be turned on or off.
...
More information on Cobundu SSO can be found in this presentation (keep in mind: Cobundu SSO available for Go, Workplace app and Studio)
View file | ||
---|---|---|
|
...
|
Presentation in French (2020):
View file | ||
---|---|---|
|
...
...
Good to know
In the Workplace platform, users are automatically disabled after 3 wrong login attempts.
For more details on possible password security settings, see General settings.