In this article, you’ll learn the following: |
Enabling single sign-on (SSO) provides an extra layer of security to your VWO account. You can set up SSO using any identity provider (IdP) that supports the creation of custom SAML applications.
NOTE: To learn about raising a request to enable SSO and using SSO to log in to your VWO account, refer to this article.
The following are the most commonly used SAML providers with which you can enable SSO for your VWO account by performing the corresponding steps:
Using Google Workspace (Formerly GSuite)
Refer to this article to use Google Workspace to create a custom SAML application, and remember to supply the following fields under Service Provider Details with the respective inputs:
Field | Input |
SSO configuration > ACS URL | https://app.vwo.com/login/ssocallback |
SSO configuration > Entity ID | https://app.vwo.com |
Name ID > Name ID format | Select EMAIL |
Name ID > Name ID | Basic Information > Primary email |
Using Okta
Refer to this article to use Okta to create a custom SAML application, and remember to supply the following fields with the respective inputs:
Field | Input |
Configure SAML > SAML Settings > General > Single sign-on URL |
https://app.vwo.com/login/ssocallback NOTE: You need to select the Use this for Recipient URL and Destination URL option so that the same URL is used as the recipient and the destination.
|
Configure SAML > SAML Settings > General > Audience URI (SP Entity ID) | https://app.vwo.com |
Configure SAML > SAML Settings > General > Name ID format | Unspecified |
Configure SAML > SAML Settings > General > Application username |
Using Microsoft Azure AD
Refer to this article to use Microsoft Azure AD to create a custom SAML application, and remember to supply the following fields with the respective inputs:
Field | Input |
Basic SAML Configuration > Identifier (Entity ID) | https://app.vwo.com |
Basic SAML Configuration > Reply URL (Assertion Consumer Service URL) | https://app.vwo.com/login/ssocallback |
Attributes & Claims > Required claim > Claim name > Unique User Identifier (Name ID) | user.userprincipalname [nameid-format:emailAddress] |
Using PingOne
Refer to this article to use Okta to create a custom SAML application, and remember to supply the following fields with the respective inputs:
Field | Input |
SAML Configuration > Manually Enter > ACS URLs | https://app.vwo.com/login/ssocallback |
SAML Configuration > Manually Enter > Entity ID | https://app.vwo.com |
Field | Input |
Attribute Mappings > Edit Attribute Mappings > PingOne Mappings | Select Email Address |