Configuring Your Identity Provider
To enable SAML SSO, provide your Identity Provider (IdP) integration parameters to your UserEvidence representative. These parameters include:
โ
Single Sign-On (SSO) URL
Entity ID (also known as Issuer)
X.509 Certificate
โ
Your Identity Provider can assist in providing this information. It is typically available through a metadata URL or sent separately. This information will be used to create an AccountSsoCredential record on our side.
SAML XML and configuration instructions
To configure the integration with your Identity Provider (IdP), you will need some specific information from us. You can use our metadata URL, which also serves as our Entity ID:
https://app.userevidence.com/users/auth/saml/metadata
Our Assertion Consumer Service (ACS) URL or auth redirect URL is:
https://app.userevidence.com/users/auth/saml/callback
To ensure the integration functions correctly, you must configure Attribute Statements on your side to include the necessary user data in the SAML Requests and Responses. The required attributes are:
โ
email
first_name
last_name
role (either editor or viewer)
For example, in Okta, here's how it should be configured:
We do not currently support Single Logout (SLO) because our session management system uses cookies to authorize each user's request, rather than storing sessions on the server. As a result, we are unable to manually invalidate a user session with our current implementation.