Configure SSO/SAML on
Updated over a week ago

Using SAML you can streamline access to, by enabling users to log in with their existing work accounts. Whether you're utilizing Okta, OneLogin, JumpCloud, Azure ADFS, or another IdP, integration is straightforward.

What is SAML?

SAML is an XML-based open standard data format for exchanging authentication and authorization data between parties, in particular, between an identity provider and a service provider. This integration provides single sign-on for SAML and, allowing you to use your SAML credentials to authenticate in


Step 1: Add new IdP (Identity Provider) to

To configure a new SAML2 integration, the administrator can go to the Enterprise Admin Panel → Authentication → Single Sign-On (SSO) → click "Add".

While adding a new IdP you can select one of the popular IdP's:

Step 2: Configure as an application in your IdP

Some IdPs allow you to automatically configure the SAML2 integration by a metadata file. You can get the metadata file by going to the Metadata URL mentioned below.

Metadata URL


Callback/ACS URL






Required attributes

  • name

  • email

  • groups (optional, for team mapping)

Example SAML-envelope:


Step 3: Configure IdP in

Go to Enterprise Admin Panel Authentication → and click "Configure" next to the IdP you created in step 1. Here you can upload the metadata file generated by the IdP. The following fields need to be specified:

  • SAML 2.0 Endpoint (HTTP)

  • IdP Entity ID

  • Public Certificate


Change the label of the login button

Finally, you can configure the look and feel of the Login button that will be shown to users on the sign-in screen of your team portal.


Test the login flow

After you have configured your IdP, you can test the login flow by clicking "Open test page" in the menu.


This will open a new browser window with test instructions. You will need to copy the URL and open it in a new Incognito Window.


Skip the login screen

After you configured your IdP, you can select it as the default login method and thereby bypass the login screen for your users. Instead of the login screen, users will immediately be redirected to the IdP login screen.


Automatically Enroll Users in the Right Enterprise Teams

You can effortlessly assign your Enterprise teams to members when they sign in through Single Sign-On (SSO). To set up this seamless process, follow these steps:

  1. Include a "groups" attribute in SAML: Ensure the SAML response includes a "groups" attribute indicating user group membership.

  2. Send us an email with the mapping of group names to your Enterprise teams.

Example Scenario:
When John Doe ( logs in via SSO, and his "groups" attribute shows 'Marketing' and 'Sales', we'll automatically place him in the 'Marketing Team' and 'Sales Team' as per your mapping."


Need assistance?

Please contact for more information about getting SAML2 integrated on

Did this answer your question?