Configure your Zoom Installation to Require Authentication from Participants


This knowledge base article describes how to configure Zoom to rely on OneLogin SAML for required participant authentication.

Questions to ask yourself before you start this SAML connector process:

OneLogin

  1. Navigate to Administration > Applications > Applications, click the Add App button, and search for SAML Custom Connector (Advanced).
  2. Change the icon if you wish and ensure it is not visible, then click Save.
  3. Navigate to the SSO tab and change your security protocol to SHA-256, then copy the Issuer URL and SAML 2.0 Endpoint (HTTP) values and paste them someplace safe for later retrieval.

  1. Click View Details under the X.509 certificate link, then download the X.509 PEM certificate and save it somewhere safe.
  2. Navigate to Parameters and ensure that NameID Value is set to the value you'll share with Zoom, probably email.
  3. Set the following parameters, ensuring that each is set to Include in Assertion:
SAML Attribute Name User field recommended
email email
FirstName First Name
LastName Last Name

  1. Click the Access tab and select which OneLogin role you want to grant to your users, then click Save.

Zoom

  1. Go to the Account Management section.

  1. Click Add Configuration, then choose Select an authentication method and pick Sign in to external Single Sign On (SSO).
  2. Under Current Provider, scroll to SAML settings.
  3. For Issuer (IDP Entity ID), enter the OneLogin Issuer URL you copied.
  4. For Sign-in page URL, enter the OneLogin SAML 2.0 Endpoint (HTTP) you copied.
  5. Ensure that the default security is set to SHA-256.

  1. In the Identity provider certificate section, paste the entirety of the X.509 certificate you copied.
  2. In the Binding section, select HTTP-POST.

  1. Click Save, then click the link to download the SP metadata file.

Additionally, you may check to ensure that the SAML attribute mapping values match the values you set in the OneLogin administration suite, including email and First Name.

  1. Open the SP metadata file with a text editor, then search for md:EntityDescription entityID and copy the URL after entityID=. Paste it somewhere safe.
  2. Search for md:AssertionConsumerService Bind Location and copy the URL that's directly after it, then paste it somewhere safe.

OneLogin

  1. Go to the SSO tab and paste the entityID URL you just copied into the Audience (EntityID) tab.
  2. Paste the AssertionConsumerService Bind Location into the Recipient, ACS (Consumer) URL Validator, and ACS (Consumer) URL fields.
  3. Go to the ACS (Consumer) URL Validator field and complete the following steps:
  1. Your finished ACS (Consumer) URL Validator field will look like ^https:\/\/zoom\.us\/saml\/externalAuth\/randomGUIDhere\/signin_randomGUIDhere$. Click Save.

You can now test your connection. For an IdP-initiated test, click the Zoom app icon from your OneLogin dashboard via a separate browser or incognito browser session.