SSO Integration
Configuring Single Sign-On (SSO) via SAML 2.0 centralizes your team's authentication. This allows users to access the Pulsetic dashboard using your organization's existing Identity Provider (IdP), enhancing security and simplifying user management.
How to Configure SSO
Access SSO Settings
- Log in to your Pulsetic dashboard.
- Navigate to Profile in the left sidebar.
- Select the Your Account tab and click on SSO.
General Settings
This tab establishes your organization’s identity within Pulsetic and generates the unique identifiers required by your IdP.
- Company Name: Enter your unique organization identifier.
Note:
- The Company Name must be one word, with no spaces, and unique.
- You must hit the Update button after typing the name to generate your unique Audience URI.
Configure IdP
Use the values generated in this tab to configure the "Service Provider" settings within your Identity Provider.
- Single Sign-On URL: The URL where Pulsetic expects to receive the authentication token.
- Audience URI (SP Entity ID): The unique ID that identifies Pulsetic to your IdP.
- Default RelayState: Instructs Pulsetic where to redirect users (e.g., the Monitors dashboard) after successful authentication.
Here are some quick setup guides for popular providers:
- If you use Okta: How to Create a SAML App Integration (Okta Docs)
- If you use Microsoft Entra ID (Azure AD): Add an Enterprise Application & Set up SSO (Microsoft Docs)
- If you use Google Workspace: Set up your own custom SAML application (Google Support)
SAML Authentication
Complete this section using the information provided by your Identity Provider.
- SAML 2.0 Endpoint (HTTP): Enter your IdP's login URL.
- Identity Provider Issuer: The IdP Entity ID for the service you use.
- Public Certificate: Copy and paste your entire x.509 certificate here.
Advanced Settings & Group Mapping
Automate role assignments based on your organization's structure.
- Define the specific SAML attributes sent by your IdP:
- First Name / Last Name SAML Attribute: (e.g.,
givenname/surname). - Groups SAML Attribute: The attribute name used to pass group memberships.
- Map your internal IdP groups to specific Pulsetic roles:
- Group Name: Enter the group name exactly as it appears in your IdP.
- Role: Assign a role (Admin or User).
- Click Add to save the mapping.
Finalizing the Setup
Once all information is entered across all tabs, click the Update button to activate the integration.
Tip:
Always test the SSO login in an Incognito/Private window first to ensure you are not locked out in case of a configuration error.