Managing Users

User management allows you to manage user access to your platform through a third-party identity provider (IdP).

In order to configure this functionality:

  1. Choose an identity provider to work with and

  2. Use the SAML configuration instructions below and apply it to your specific IdP.

It is recommended to consult your IdPs specific documentation for instructions on how to apply this SAML configuration.

Additionally, if you are using Anypoint Platform Private Cloud Edition, you can configure LDAP to manage users in your organization.

For Anypoint Platform Organizations with child Business Groups, only the master Organization can configure external identity. Once configured it applies to all child Business Groups.

Identity Providers

The Anypoint Platform supports SAML 2.0 compliant identity management providers for user management and SSO.
Although any SAML 2.0 compliant provider can be configured for this use, the following IdPs have been successfully tested as working with Anypoint Platform:

For these providers, the 'Assertion Consumer Service' or 'SAML Assertion URL' is and the 'entityID' or 'Audience URL' is any string value that identifies your organization.
By convention it is <organizationDomain>, but any value is acceptable.

If you wish to configure the same IdP for both user and client management (to facilitate OAuth security for APIs), then you need to use either OpenAM or PingFederate, as these are the only IdPs that Anypoint Platform supports for Client Management.

If you choose to configure either OpenAM or Ping Federate and you wish to implement both types of management, then based on the IdP you want to configure, follow the openAM for client management instructions or the PingFederate for client management instructions respectively.

Instructions for SAML Configuration

The instructions in this document allow you to configure your Anypoint Platform organization with any of the supported SAML 2.0 providers for SSO.

To configure federated identity:

  1. Configure your SAML provider to set up your Anypoint Platform organization as your audience.

  2. Set the Assertion Consumer Service to send an HTTP POST request to the following address:

  3. Log in with an administrator account into your Anypoint organization, click on the gear icon in the Nav bar which will take you to the Access Manager user interface , and select External Identity. If you haven’t set anything yet, you should see a screen like this:

    new saml

  4. Click the link for "If you would like to configure single sign on with a SAML 2.0 provider you can get started here" and then provide the necessary data in the SAML 2.0 form to set up your Anypoint organization for SSO:

    federated identity form

    You must provide the following information in the form:

Field Description


ID of the identity provider instance that sends SAML assertions.

Public Key

Public key provided by the identity provider, used to sign the SAML assertion.


ID of the Service Provider (In this case, the Anypoint Platform). This is a string value that identifies your organization. By convention it is <organizationDomain>, but any value is acceptable.

Username Attribute

Field name in the SAML repository that maps to username. By default, the 'NameID' attribute in the SAML assertion is used.

First Name Attribute

Field name in the SAML repository that maps to First Name.

Last Name Attribute

Field name in the SAML repository that maps to Last Name.

Email Attribute

Field name in the SAML repository that maps to Email.

Group Attribute

Field name in the SAML repository that maps to Group.

Sign On URL

URL where users must sign in.

Sign Out URL

URL to redirect sign out requests, so users both sign out of the Anypoint Platform and have their SAML user’s status set to signed out.

The Anypoint Platform does not initiate the SAML assertion for the single sign on. The Sign On URL that you configure is your IdP’s initiated SSO.

Verify SAML Information

The SAML assertion is an XML file that is issued by the external identity provider. This assertion must be signed in order for our end to verify its integrity, but unencrypted, since the assertion itself is POSTed through HTTPS.

Log into Anypoint Platform and click the External Identity tab to verify your organization’s Identity management information.


Verify that the group_attribute value is set to the correct attribute name.
In the example above, the attribute is named memberOf. You can see a sample SAML assertion with that attribute below:

<saml:Attribute NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic" Name="memberOf">
  <saml:AttributeValue xmlns:xsi="" xsi:type="xs:string">cn=jira-users,ou=groups,dc=muleforge,dc=org</saml:AttributeValue>
  <saml:AttributeValue xmlns:xsi="" xsi:type="xs:string">cn=confluence-users,ou=groups,dc=muleforge,dc=org</saml:AttributeValue>
  <saml:AttributeValue xmlns:xsi="" xsi:type="xs:string">cn=mule-community,ou=groups,dc=muleforge,dc=org</saml:AttributeValue>
  <saml:AttributeValue xmlns:xsi="" xsi:type="xs:string">cn=SR-User,ou=Groups,dc=muleforge,dc=org</saml:AttributeValue>

All other information on the tab is provided when registering an organization to use Anypoint Platform. If any information needs to be changed, log into the MuleSoft Support Portal and submit a request.
All attribute names must match on both the IdP and Anypoint Platform’s side.

If you need assistance troubleshooting your SAML assertions, submit a ticket with us through the MuleSoft Support Portal providing:

  1. A screenshot of your SAML configuration in Anypoint Platform

  2. An XML SAML assertion

Some providers allow you to generate sample assertions. A SAML assertion can also be captured by inspecting the HTTP POST sent by the browser to the SAML Assertion URL ( after successfully authenticating to the IdP.
The HTTP request can be inspected using tools such as Chrome Developer Tools, Firebug for Firefox or SAML tracer. It’s cbase64 encoded.

Exporting assertion metadata to later import it in your selected IdP is currently not supported.

Single Log Out

Single log out is important so that a user or user agent can log out of an authenticated environment and ensure that both service providers and identity servers process the log out correctly.

To configure single log out:

  1. In PingFederate, click the SP Configuration for the Anypoint Platform.

  2. Go to Browser SSO and click Configure Browser SSO.

  3. Under SAML Profiles, ensure that these are set:

    • IdP-Initiated SSO

    • IdP-Initiated SLO

    • SP-Initiated SLO

  4. Go to Protocol Settings and click Configure Protocol Settings.

  5. Configure a SLO Service Url with the following:

    • Binding: POST

    • Endpoint URL: Set PARTNER_SP_ID to the correct value:

      It’s also possible to control where the user is redirected after signing out. Most customers like to redirect the user to a different page so we allow you to configure that in your PingFederate’s service provider configuration. You can add a redirect_uri query parameter to the SLO Service URL and the Anypoint Platform routes the user there rather than to the Anypoint Platform sign-in page.

      For example, if you want to route the users back to your signin page, make the URL:

      If you want to route the users back to your portal page, make the URL:
  6. Under Allowable SAML Bindings, click Redirect.

  7. Under Encryption Policy, make certain that nothing is encrypted.

  8. Save and click Done out of Protocol Settings and Browser SSO.

  9. When viewing the SP Configuration for Anypoint Platform, go to Credentials, and click Configure Credentials.

  10. Under Signature Verification Settings, click Manage Signature Verification Settings. Set the Trust Model to Unanchored, and import the attached certificate. Make it the active certificate.

Federated Organizations - Map Users to Anypoint Platform Roles

As of November 2014, Anypoint Platform provides a feature to help you map users in a federated organization’s LDAP group to an Anypoint Role.

This requires that your Anypoint Platform organization utilizes an external identity provider such as PingFederate.

This feature enables users in an organization to sign in to Anypoint Platform using the same organizational credentials and access permissions that an organization maintains using LDAP.
This ensures credential security and maintains organizational roles for accessing privileged information.

To support this feature you first need to configure an external identity following any of the methods described above, and then follow the two steps described below:

Configure Roles

To configure a role:

  1. In Anypoint Platform, click Roles. Click Add role to create a role for each group of users in your organization.

    external identity 34af9
  2. Specify a role name and description. Click Add role to add the role:

    external identity c731b
  3. In the Roles menu, click the name of the new role:

    external identity 35f9a
  4. Click Set external group mapping:

    external identity 251b8
  5. Copy the string from your SAML assertion’s AttributeValue to the External group name field, for example:

    SAML AttributeValue:

    <saml:AttributeValue xmlns:xsi=""


    external identity cfb1e

  6. Click Set names.

    1. If you want to map more than one attribute name to the selected role, you can click on the Add more option and add another attribute.

  7. Repeat this process for each role that you would like mapped to an external group.

Configure LDAP

The following instructions allow you to configure user management using LDAP v3. for your Private Cloud Edition of Anypoint Platform.

User management through LDAP is only available for the Private Cloud Edition.
  1. Go to your external identity section in your navigation bar.

  2. Click the LDAP link from the "To get started, you can configure OpenAM, PingFederate, LDAP or SAML 2.0." message:

    external identity df207

  3. Set the connection settings for your LDAP service.

    external identity e39e0

    Field Description Example


    The hostname of your LDAP server.

    If you are using TLS in your ldap server, you should use ldaps://



    The port used to communicate to your LDAP server

    The default ldap port is 389.
    The default ldaps port is 636.


    Self-Signed Cert

    Mark this checkbox if you are using a self-signed certificate on your LDAP server

    Use a Self-Signed certificate for testing your connection to the LDAP server.

    Bind DN

    The distinguished names for the user making the LDAP queries.



    The password for the LDAP server


    Connection Timeout

    The timeout frame (in seconds) for a connection


    Operation Timeout

    The timeout frame (in milliseconds) for an operation


  4. Set up search bases

    external identity 60787

    Field Description Example


    The base level for your user search base object



    The base level for your groups search base object


  5. Set the distinguished names for your user and group

    external identity 314bf

    Field Description Example


    The distinguished name for your user search base object



    The distinguished name for your groups search base object


  6. Set the search filters

    external identity 4640a

    Field Description Example

    User by Username

    The search filter to find users by username


    User by Email

    The search filter to find users by email


    Group by GroupName

    The search filter to find groups by groupName


    User’s Groups by Username

    The searh filter to find user’s groups by userName


  7. Map the User fields

    external identity a8f0e

    Field Description Example


    Field that represents the UserName



    Field that represents the email


    First Name

    Field that represents the First name


    Last Name

    Field that represents the Last name



    Id for your user


  8. Map the group fields

    external identity 56faf

    Field Description Example

    Group Name

    Field that represents your Group name.



    Field that represents your groups Id


Click the Save button to save your configuration.

Considerations for User Management

Enabling SSO for your users has a few implications on your Anypoint Platform Account.

  • If you configure and IdP to handle user information assertion, the login URL for accessing Anypoint Platform will then be{yourorgDomain}.

  • Your IdP needs to be configured to send both Username and Email in your assertion, and your Anypoint Platform needs to be configured to map them to the expected attribute name. Otherwise the login fails with a 403 unauthorized error message.

  • Users that are created prior to configuring your federated organization remain. However, they can login only through the Anypoint Plaform Sign In page and not through the IdP’s redirected custom login page.
    With External Identity enabled, the invite button is disabled and no new non-federated users can be added.
    Existing non-federated users continue to work as normal, with some exceptions:

    • If their session times out, they will be redirected to the Federated Identity login page, instead of the generic one.

    • Links and bookmarks that identify the organization will redirect the user to the Federated login, which will fail for non-federated users.

  • Federated users cannot use platform APIs

  • The email firstname and lastname fields get updated automatically every time a user signs in with your IdP, with the primary key being the username field.