Activate SAML SSO for a Company
Última actualización
Última actualización
This authentication method was implemented to avoid manually creating users within a company and to allow them to use the same credentials from SAML applications. For example, with Microsoft, you can configure it so that all users in your domain can log in to the Shippify dash. As users log in to the dash, they will be created in the system under specific roles.
Through SAML SSO, you can assign user roles that provide certain permissions in the Shippify account, which also apply to all Shippify APIs. User roles are assigned in the identity provider and transferred to Shippify in the SAML assertion. The available user roles are:
Many identity providers use custom attributes and attribute statements for roles. Typically, roles can be assigned to individuals or groups. Refer to your specific IdP documentation for more details.
To complete the initial connection between the identity provider and shippify.co, enter the required information in the SSO configuration page of your Shippify account.
Domain: domain of the users' emails.
Default user role: Role that new users will take within Shippify.
Click on Next to submit the form. You will be prompted to complete the SAML IdP details.
Identifier
refers to the Entity ID
, Issuer,
or Issuer URL
in your IdP. Copy this value into your IdP.
Reply URL
refers to the Assertion consumer service.
Copy this value into your IdP.
Identity Provider logout URL
refers to the SSO sign-out URL
in your IdP. Copy this value into your IdP.
App federation metadata URL.
From your IdP's SSO configuration page, copy the metadata URL to the Shippify configuration page and click Enable SSO to complete the setup.
Role | Alias role | Description |
---|---|---|
Super Admin
super_admin
Manage all the account options and settings.
User
operator
Allow full task management and editing of profile settings.
Searcher
searcher
Only allowed to perform searches.