Skip to main content
Custom SSO Setup

Guide to Configuring SAML/Single Sign-On (SSO) for Savant

Updated over 2 weeks ago

Welcome to the Single Sign-On (SSO) configuration guide! This document provides a step-by-step process to configure your SSO platform (Identity Provider, or IdP) and connect it to Savant, your Service Provider (SP). Currently, Savant only supports IdP-initiated SSO flow.

Features

  • Secure user authentication via IdP-initiated SSO.

  • Automatic user provisioning based on email addresses.

  • Integration with SAML 2.0 protocol.

Requirements

To set up SSO integration, the following requirements must be met:

  • Access to your SSO platform (e.g., Okta, Azure AD).

  • SAML 2.0 configuration capabilities in your IdP.

  • Savant Integration ID (provided by Savant).

  • Basic understanding of SSO/SAML setup.

Configuration

Savant supports multiple SSO platforms including the below mentioned for secure access:

  • Okta

  • Microsoft Azure

Step 1: Obtain Savant SAML Integration ID

  • Request the SAML Integration ID from Savant (e.g., integrationId=e771a42wtv).

  • This ID will be used in the SP metadata URLs and Assertion Consumer Service URL (ACS URL).

Step 2: Gather SP Metadata from Savant

  • Use the following URLs to access the SP metadata for configuration in your IdP:

    • US Region:

      • SP Entity ID:
        https://saml.savantlabs.io/saml2/service-provider-metadata/{integrationId}

      • ACS URL (SSO URL):
        https://saml.savantlabs.io/login/saml2/sso/{integrationId}

    • EU Region:

      • SP Entity ID:
        https://saml-eu.savantlabs.io/saml2/service-provider-metadata/{integrationId}

      • ACS URL (SSO URL):
        https://saml-eu.savantlabs.io/login/saml2/sso/{integrationId}

Step 3: Create a SAML 2.0 Application in Your IdP

  • Add Savant as a new SAML 2.0 application in your IdP (e.g., Okta, Microsoft Entra ID / Azure AD).

  • Provide the SP Entity ID and ACS URL obtained in Step 2.

  • Ensure the Name ID format is set to emailAddress.

  • Map the user attributes:

    • First Name: firstName

    • Last Name: lastName

  • Optional: Customize the application logo by using the following links:

Step 4: Configure SSO Settings in Your IdP

For Okta:

  1. Log in to Okta and navigate to the Applications section.

  2. Create a new application, choose SAML 2.0, and paste the SP Entity ID and ACS URL from Step 2.

  3. Set the Name ID format to emailAddress.

  4. Map the firstName and lastName attributes.

  5. Complete the configuration and save the settings.

The below screenshot shows how to collect Identity Provider Metadata URL using OKTA

For Azure AD (Microsoft Entra ID):

  1. Navigate to Enterprise applications.

  2. Select New application > Create your own application.

  3. Name the application and choose Integrate any other application you don’t find in the gallery.

  4. Select SAML-based Sign-On as the authentication method.

  5. Use the SP metadata URLs from Step 2 to configure the Entity ID and ACS URL.

  6. Ensure the Name ID format is emailAddress.

  7. Save the application settings.

Step 5: Share IdP Metadata with Savant

  • Once the IdP is configured, obtain the IdP metadata URL from your IdP dashboard (e.g., from Okta or Azure AD).

  • Provide this metadata URL to the Savant team for further integration.

Step 6: User Access Configuration

  • In your IdP, configure the users or groups who have access to the Savant application.

For Okta:

  1. Go to Assignments and assign the application to the relevant users or groups.

For Azure AD:

  1. Navigate to Users and groups.

  2. Assign the Savant app to the necessary users or groups.

Step 7: Test the SSO Integration

  • After Savant completes the integration, users can authenticate via IdP-initiated SSO:

Alternatively, users can access the Savant app directly via the URL shared by the admin.


Troubleshooting

If you encounter issues during the SSO setup or authentication, follow these troubleshooting steps:

  1. Ensure the SP metadata URL and ACS URL are correctly configured in your IdP.

  2. Verify that the Name ID and other user attributes (like first and last name) are correctly mapped.

  3. Ensure the appropriate users/groups have access to the Savant app in the IdP.

  4. Ensure the IdP is correctly routing users to Savant via the ACS URL.


Don’t see what you’re looking for? Contact us in the Community or reach out in Chat Support


Did this answer your question?