Learn how to configure a connection to OneLogin via SAML.
Each SSO Identity Provider requires specific information to create and configure a new Connection. Often, the information required to create a Connection will differ by Identity Provider.
To create an OneLogin SAML Connection, you’ll need an ACS URL and a OneLogin SAML Metadata file.
Start by logging into your WorkOS Dashboard and selecting “Organizations” from the left hand navigation bar.
Click on the organization you’d like to configure a OneLogin SAML connection for and select “Manually Configure Connection”.
Select “OneLogin SAML” from the Identity Provider dropdown, enter a descriptive name for the connection, and then select the “Create Connection” button.
The ACS URL is the location an Identity Provider redirects its authentication response to. In OneLogin’s case, it needs to be set by the Enterprise when configuring your application in their OneLogin instance.
Next, provide the OneLogin SAML Metadata file.
Normally, this will come from your Enterprise customer’s IT Management team when they set up your application’s SAML 2.0 configuration in their OneLogin admin dashboard. But, should that not be the case during your setup, the next steps will show you how to obtain it.
Log in to OneLogin, go to the admin dashboard, and select “Applications” in the navigation bar.
Select “Configuration” from the left-hand navigation:
Select “Parameters” from the left-hand navigation and add the following field-value parameter pairs:
Check the “Include in SAML assertion” flag for each pair.
Select “SSO” from the left-hand navigation.
Select the “More Actions” dropdown and click on “SAML Metadata”. This will download an XML metadata file.
In the Connection Settings of the WorkOS Dashboard, click “Edit Metadata Configuration”.
In the modal that pops up, upload the OneLogin Metadata file and then select “Save Metadata Configuration”.
Once the file has uploaded, your Connection will then be linked and good to go!