SAML SSO
Guides for enabling SSO for all SAML-based SSO providers
SAML 2.0 single sign-on (SSO) lets your team authenticate to Validio through your organization's identity provider instead of managing separate credentials.
Deployment Instance URL
The deployment instance URL is the base URL that you use to access your Validio instance. For example,
https://YOUR-INSTALLATION.validio.io.
Google Workspace
-
Set up a custom SAML app in the Google Workspace Admin console, with your Validio deployment information:
- ACS URL:
[Deployment instance URL]/login/saml2 - IdP Entity ID:
[Deployment instance URL]/saml2 - Name ID format:
[EMAIL] - Leave other fields as default
- ACS URL:
-
Add a new identity provider in Validio:
- Entry point / SSO URL:
https://accounts.google.com/o/saml2/idp?idpid=[Identity provider ID] - Entity ID:
[Deployment instance URL]/saml2 - Certificate: The certificate (string value) is found in the Google Workspace Admin console or in the IDP metadata.
- Entry point / SSO URL:
For information, refer to Google Workspace Admin Help: Set up your own custom SAML application.
JumpCloud
-
Set up a custom SAML app in the JumpCloud admin console , with your Validio deployment information:
- Entity ID:
[Deployment instance URL]/saml2 - SP Entity ID:
[Deployment instance URL]/saml2 - Assertion Consumer Service (ACS) URL:
[Deployment instance URL]/login/saml2 - SAMLSubject NameId Format: select
urn:oasis:names:tc:SAML:1:1:nameid-format:emailAddress - Signature Algorithm:
RSA-SHA256 - Select the 'Sign Assertion' option
- Entity ID:
-
Add a new identity provider in Validio:
- Entry point / SSO URL: Same value as IDP URL for your application in JumpCloud
- Entity ID:
[Deployment instance URL]/saml2 - Certificate: Download the certificate under JumpCloud> SSO Applications> your configured application > IDP Certificate valid > Download certificate (paste the entire content of the downloaded certificate.pem into this field)
Microsoft Entra ID
- Setup an Enterprise Application using SAML
- Identifier (Entity ID):
[Deployment instance URL]/saml2 - Reply URL (ACS URL):
[Deployment instance URL]/login/saml2
- Identifier (Entity ID):
- Add a new identity provider in Validio:
- Entry point / SSO URL:
https://login.microsoftonline.com/[TenantID]/saml2 - Entity ID:
[Deployment instance URL]/saml2 - Certificate: Download the Base64 version on Entra> Single sign-on> SAML Certificates and paste the string to the Certificate field on Validio.
- Entry point / SSO URL:
Okta
- Setup an Enterprise Application using SAML
- Single Sign on URL
[Deployment instance URL]/login/saml2 - Audience URI (SP Entity ID):
[Deployment instance URL]/saml2 - Name ID format: Email Address
- Single Sign on URL
- Add a new identity provider in Validio
- Entry point / Identity Provider SSO URL:
https://your-okta-domain/.../sso/saml - Entity ID:
[Deployment instance URL]/saml2 - Certificate: Find under Application > Sign On > Signing Certificate > Copy
- Entry point / Identity Provider SSO URL:
CyberArk
-
Setup an Enterprise Application using SAML.
Under Manual Configuration, fill in the following information:
- SP Entity ID / Issuer / Audience:
[Deployment instance URL]/saml2 - Assertion Consumer Service (ACS) URL:
[Deployment instance URL]/login/saml2 - Recipient: Same as ACS URL
- Sign Response or Assertion: Both
- Name ID format: emailAddress
- SP Entity ID / Issuer / Audience:
-
Add a new identify provider in Validio
- Entry point / SSO URL: Find under Identity Provider Configuration > Metadata > Single Sign On URL, and should be formatted as
https://xxxx.my.idaptive.app/applogin/appKey/xxxxxx/customerId/xxxxx - Certificate: Find under Identity Provider Configuration > Metadata > Signing Certificate.
- Entry point / SSO URL: Find under Identity Provider Configuration > Metadata > Single Sign On URL, and should be formatted as
Updated 10 days ago