Skip to main content

Integrate With an Identity Provider and Log in with SAML SSO

Integrating UserEvidence with your identity provider makes logging in simple and secure for your team.

T
Written by Tom Aristone
Updated over 2 months ago

Configuring Your Identity Provider

To enable SAML SSO, provide your Identity Provider (IdP) integration parameters to your UserEvidence representative. These parameters include:
โ€‹

  • Single Sign-On (SSO) URL

  • Entity ID (also known as Issuer)

  • X.509 Certificate
    โ€‹

Your Identity Provider can assist in providing this information. It is typically available through a metadata URL or sent separately. This information will be used to create an AccountSsoCredential record on our side.

SAML XML and configuration instructions

To configure the integration with your Identity Provider (IdP), you will need some specific information from us. You can use our metadata URL, which also serves as our Entity ID:

https://app.userevidence.com/users/auth/saml/metadata

Our Assertion Consumer Service (ACS) URL or auth redirect URL is:

https://app.userevidence.com/users/auth/saml/callback

To ensure the integration functions correctly, you must configure Attribute Statements on your side to include the necessary user data in the SAML Requests and Responses. The required attributes are:
โ€‹

  • email

  • first_name

  • last_name

  • role (either editor or viewer)


For example, in Okta, here's how it should be configured:

We do not currently support Single Logout (SLO) because our session management system uses cookies to authorize each user's request, rather than storing sessions on the server. As a result, we are unable to manually invalidate a user session with our current implementation.

Did this answer your question?