• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

Company · Blog · Newsletter · Events · Partner Program

Downloads      Support      Security     Admin Login
Rublon

Rublon

Secure Remote Access

  • Product
    • Regulatory Compliance
    • Use Cases
    • Rublon Reviews
    • Authentication Basics
    • What is MFA?
    • Importance of MFA
    • User Experience
    • Authentication Methods
    • Rublon Authenticator
    • Remembered Devices
    • Logs
    • Single Sign-On
    • Access Policies
    • Directory Sync
  • Solutions
    • MFA for Remote Desktop
    • MFA for Remote Access Software
    • MFA for Windows Logon
    • MFA for Linux
    • MFA for Active Directory
    • MFA for LDAP
    • MFA for RADIUS
    • MFA for SAML
    • MFA for RemoteApp
    • MFA for Workgroup Accounts
    • MFA for Entra ID
  • Customers
  • Industries
    • Financial Services
    • Investment Funds
    • Retail
    • Technology
    • Healthcare
    • Legal
    • Education
    • Government
  • Pricing
  • Docs
Contact Sales Free Trial

Rublon 2FA for Envoy

2FA/MFA for Envoy

April 13, 2021 By Rublon Authors

Last updated on October 16, 2024

Overview

The purpose of this document is to enable Rublon Two-Factor Authentication (2FA) for users logging in to Envoy. In order to achieve that, you have to use Rublon Access Gateway. All required steps will be described in this document.

Supported Authentication Methods

Authentication Method Supported Comments
Mobile Push ✔ N/A
WebAuthn/U2F Security Key ✔ N/A
Passcode ✔ N/A
SMS Passcode ✔ N/A
SMS Link ✔ N/A
Phone Call ✔ N/A
QR Code ✔ N/A
Email Link ✔ N/A
YubiKey OTP Security Key ✔ N/A

Before you start

You need to install and configure Rublon Access Gateway itself before configuring Envoy to work with it. Please read the Rublon Access Gateway documentation and follow the steps in Installation and Configuration sections. Afterwards, follow the Configuration section in this document.

Configuration

Follow these steps to enable Rublon 2FA in Envoy.

Envoy

1. Log in to Envoy as global admin.

2. In the pane on the left, click Integrations.

3. Navigate to Single sign-on and click the Install button inside the SAML tile.

4. If installation has been completed and you have not been automatically redirected to the SAML configuration page, scroll up to the beginning of the page and click the Enabled integrations tab. Then click Configure.

5. In Fingerprint, enter a SHA1 fingerprint of the Rublon Access Gateway certificate (Applications → Information for configuring applications with Rublon Access Gateway → DOWNLOAD CERTIFICATE).

Note

Certificate fingerprint must be in SHA1. 

Use openssl or an online converter of your choice to calculate a SHA1 fingerprint of your certificate.

6. In Identity Provider HTTP SAML URL, enter the value of SSO URL from Rublon Access Gateway (Applications → Information for configuring applications with Rublon Access Gateway).

7. Copy the values of Assertion Consumer Service (ACS) URL and Issuer URL. You will need these values when configuring Envoy in Rublon Access Gateway. 

8. Copy the value of Sign On URL (SP-initiated only). You will be later using this link to log in to Envoy using Rublon 2FA.

9. We recommend you leave the Required checkbox unchecked at least until you have tested Rublon 2FA. When Required is enabled, only admins can log in using the traditional password. All other users can only log in using Rublon 2FA.

10. Click Save to add your SAML configuration.

Rublon Access Gateway

1. In Rublon Access Gateway, go to Applications → Add application.

2. Fill in the form and click SAVE to add a new application. Refer to the following image and table.

Application nameEnter a name for the application, e.g. Envoy. The name will be displayed during Rublon 2FA.
Entity IDEnter the value of Issuer URL from Envoy. This is one of the values you have copied before.
Assertion Consumer ServiceEnter the value of Assertion Consumer Service (ACS) URL from Envoy. This is one of the values you have copied before.
Single Logout Servicehttps://envoy.com/
NameID formaturn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress
NameID attributemail
Send AttributesNameID
Signature algorithmsha-256
Validate Authn RequestUncheck.
Sign responseCheck.
Certificate for signingSelect the certificate you have downloaded from Applications → Information for configuring applications with Rublon Access Gateway → DOWNLOAD CERTIFICATE.
Map attributesIn the IdP Attribute field, type E-Mail Addresses.

In the SAML Response Attribute field, type E-Mail Address.

3. Your configuration is now complete. You can log in to Envoy with Rublon 2FA.

Log in to Envoy with Rublon 2FA

1. Go to the Sign On URL (SP-initiated only) link. This is the Integrations → Enabled integrations → SAML → Configure link from Envoy you were asked to copy. The link has the following format:
https://app.envoy.com/a/saml/auth/example

Note

Alternatively, you can log in through the main site. Click Log in in the upper-right corner and then click Log in using Single Sign On after providing your email address.

2. You will be redirected to the Rublon Access Gateway login page.

3. Provide your username and password. Click SIGN IN. A window will appear with a selection of various 2FA options from Rublon. Let’s choose Mobile Push.

4. You will be sent a push notification. Tap APPROVE.

5. You will be successfully logged in to Envoy.

Troubleshooting

If you encounter any issues with your Rublon integration, please contact Rublon Support.

Related Posts

Rublon Access Gateway

Rublon Access Gateway – Integrations

Filed Under: Documentation

Primary Sidebar

Contents

  • Overview
  • Supported Authentication Methods
  • Before you start
  • Configuration
    • Envoy
    • Rublon Access Gateway
  • Log in to Envoy with Rublon 2FA
  • Troubleshooting
  • Related Posts
Try Rublon for Free
Start your 30-day Rublon Trial to secure your employees using multi-factor authentication.
No Credit Card Required


Footer

Product

  • Regulatory Compliance
  • Use Cases
  • Rublon Reviews
  • Authentication Basics
  • What is MFA?
  • Importance of MFA
  • User Experience
  • Authentication Methods
  • Rublon Authenticator
  • Remembered Devices
  • Logs
  • Single Sign-On
  • Access Policies
  • Directory Sync

Solutions

  • MFA for Remote Desktop
  • MFA for Windows Logon
  • MFA for Remote Access Software
  • MFA for Linux
  • MFA for Active Directory
  • MFA for LDAP
  • MFA for RADIUS
  • MFA for SAML
  • MFA for RemoteApp
  • MFA for Workgroup Accounts
  • MFA for Entra ID

Industries

  • Financial Services
  • Investment Funds
  • Retail
  • Technology
  • Healthcare
  • Legal
  • Education
  • Government

Documentation

  • 2FA for Windows & RDP
  • 2FA for RDS
  • 2FA for RD Gateway
  • 2FA for RD Web Access
  • 2FA for SSH
  • 2FA for OpenVPN
  • 2FA for SonicWall VPN
  • 2FA for Cisco VPN
  • 2FA for Office 365

Support

  • Knowledge Base
  • FAQ
  • System Status

About

  • About Us
  • Blog
  • Events
  • Co-funded by the European Union
  • Contact Us

  • Facebook
  • GitHub
  • LinkedIn
  • Twitter
  • YouTube

© 2025 Rublon · Imprint · Legal & Privacy · Security

  • English