Skip to main content
All CollectionsSettings
Setting up SAML-based login
Setting up SAML-based login
Updated over a week ago

Overview

SAML allows users to authenticate with a central Identity Provider (IdP) and access multiple applications using those same credentials. In the context of Factors, SAML login lets users bypass creating separate logins for Factors and instead leverage their existing IdP credentials for authentication.

How to set it up

Factors supports SAML-based login with most of the Identity Providers (IdP) like Okta, Azure, OneLogin, etc. Depending on the IdP that your organization uses, you can find specific instructions on how to enable SAML login using your IdP below.

Using Okta

  1. Login to your Okta account and navigate to "Applications".

  2. Click "Create App Integration", create a "SAML 2.0" app, and click Next.

  3. Give the app a name and hit "Next".

  4. In the next step, add the "Single sign-on URL". You can find this inside your Factors project by going into Settings >> Login and Security and then enabling SAML.

  5. Copy the "ACS URL" from your Factors project and paste it into the "Single sign-on URL" field in Okta.

  6. Next, enter a provider ID next to "Audience URI (SP Entity ID)". For example - Factors. Also, ensure the "Name ID format" is set as "EmailAddress".

  7. Then, scroll down and click on Advanced Settings. Under Advanced Settings, you will find a field called "SAML Issuer ID". Populate this field with the "Identifier" you find inside your Factors project.

  8. Then, under "Attribute Statements", set Name as "user_email", Name format as "Basic" and Value as "user.email".

  9. Once done, click on "Next" to go to the next step.

  10. In the next step, select this is an internal app and then hit "Finish".

  11. Your Factors app will now be created on Okta. To finish the setup, go to the "Sign On" tab inside the app and click on "More details".

  12. From there, find the Sign On URL, Sign out URL, and the Signing Certificate. Copy and paste all of these into their respective fields inside your Factors project and hit "Save".

  13. And that's it! Your project will now require all users to log in via Single Sign On using your configured Identity Provider.

Did this answer your question?