SAML

Modified on Tue, 11 Mar at 12:02 PM

SAML 

To set up a SAML connection between an external IdP (ie. Google Workplace) and Service Provider (Simployer Auth0), you'll need to configure both services to establish the trust and exchange of SAML metadata. 


Client-side - Set up external IdP configuration 

  • ACS Uri - as https://login.simployer.com/login/callback?connection=hrd-XXXXX 

  • Entity ID - as urn:auth0:simployer:hrd-XXXXX 

  • ClaimType Mapping - by the current SAML standard 


Using Google Workplace App as an example 

  1. Sign in to your Google Admin console (admin.google.com).  

  1. Go to the "Apps" section and select "Web and mobile apps."  

 


  1. Click the "Add app” button to add a new “Custom SAML app”. 

 


  1. Fill App details 

 

 


  1. Download IdP metadata  

 


  1. Fill ACS URL and Entity ID fields according to the values provided by Simployer. 

 


  1. Add SAML attribute mapping according to the values provided by Simployer and finish creating the app. 

 

 


6. After creation expand the “User Access” section and turn on the application 

 


The client on its side can decide whether to make the application available to all users in the entire organization unit, to a subunit, or to a specific group. 

metadata.xml file downloaded during app creation should be shared with Simployer to complete the integration setup. It can be placed on a public (unsecured) FTP/http endpoint or sent via any other method agreed with the integration team. The file does not contain any sensitive data. 


Was this article helpful?

That’s Great!

Thank you for your feedback

Sorry! We couldn't be helpful

Thank you for your feedback

Let us know how can we improve this article!

Select at least one of the reasons
CAPTCHA verification is required.

Feedback sent

We appreciate your effort and will try to fix the article