Administrator authentication
Administrator authentication controls how your administrators access the Mambo platform. This guide explains the available authentication methods and provides detailed setup instructions for each option.
Prerequisites
- Administrator access to Mambo
- HTTPS enabled for SAML authentication
- Relevant directory service credentials (for LDAP/SAML)
Authentication methods
Mambo internal directory
The simplest authentication method where administrator credentials are stored directly in Mambo. Administrators use their UUID as username and a configured password to access the administration panel.
LDAP directory
Connect Mambo to LDAP-compatible directories like Microsoft Active Directory. Administrators use their existing directory credentials for authentication.
Configuration steps:
- Configure LDAP server connection details
- Map LDAP attributes to Mambo fields
- Test the connection
- Save and validate settings
SAML directory
Enable Single Sign-On (SSO) through any SAML-compatible identity provider. Users are redirected to their organisation's login portal and returned to Mambo after successful authentication.
Important: Administrators must use the specific login URL provided in the "New Login Address" section.
SAML provider setup guides
Google workspace
Google configuration
- Access Google Admin console (admin.google.com)
- Navigate to Apps > Web and mobile apps
- Click Add App > Add custom SAML app
- Configure app details:
- Name: Mambo
- Icon: Optional
- Download IDP metadata from the Google Identity Provider page
- Configure Service Provider Details:
- ACS URL: Copy Mambo's SAML Callback URL
- Entity ID: Use the same SAML Callback URL
- Set attribute mappings:
- Primary email → email
- First name → firstname
- Last name → lastname
- Enable the application for your organisation
Mambo configuration
- Navigate to Server Settings
- Switch IDP Metadata to XML
- Copy IDP Metadata file contents to the field
- Select Default Groups for administrators
- Configure user synchronisation:
- UUID → email
- First Name → firstname
- Last Name → lastname
- Email → email
- Save directory settings
Azure Active Directory
Azure configuration
- Access Azure portal (portal.azure.com)
- Navigate to Azure Active Directory > Enterprise applications
- Create new Azure AD SAML Toolkit application
- Configure single sign-on:
- Select SAML method
- Entity ID: Mambo's SAML Callback URL
- Reply URL: Mambo's SAML Callback URL
- Sign on URL: Mambo's New Login Address
- Configure attribute mappings:
- Copy the App Federation Metadata URL
Mambo configuration
- Navigate to Server Settings
- Set IDP Metadata to URL
- Enter the App Federation Metadata URL
- Select Default Groups for administrators
- Configure attribute mappings as shown above
- Save directory settings
Auth0
Auth0 configuration
- Create new Regular Web Application
- Configure basic settings:
- Name: Mambo
- Allowed Callback URLs: Mambo's SAML Callback URL
- Access Advanced Settings > Endpoints
- Copy the SAML Metadata URL
Mambo configuration
- Navigate to Server Settings
- Set IDP Metadata to URL
- Enter the SAML Metadata URL
- Select Default Groups for administrators
- Configure attribute mappings:
- Save directory settings
Troubleshooting
Common issues and solutions:
- Failed SAML login: Verify HTTPS is enabled and callback URLs are correct
- Missing user attributes: Check attribute mapping configuration
- Access denied: Ensure default groups are properly configured
- LDAP connection issues: Verify network connectivity and credentials