Setting Up SAML Single Sign-On
SAML (Security Assertion Markup Language) allows your users to log in to XMAP using your organisation’s Identity Provider (IdP), such as Microsoft Entra ID, Okta, OneLogin, or any SAML 2.0 compatible service. This removes the need for separate XMAP credentials and lets you manage access centrally.
Prerequisites
Before you begin, ensure you have:
1. Admin access to XMAP — You must be an Organisation Administrator.
2. Admin access to your Identity Provider — You’ll need to create a SAML application in your IdP.
Step 1: Create a SAML Strategy
1. In XMAP, navigate to Admin > My Organisation > Authentication.
2. Click the + button and select SAML from the dropdown.
3. A new strategy will be created with default values.
Give your strategy a meaningful Name (e.g. “Okta SSO” or “Company SAML”).
Using a Metadata URL (Recommended)
If your Identity Provider supplies a metadata URL:
1. Paste the URL into the IdP Metadata URL field.
2. Click Fetch.
3. The Entry Point, Issuer, Certificate, and Name ID Format fields will be populated automatically.
Manual Configuration
If you don’t have a metadata URL, enter the following details from your IdP manually:
Field | Description |
Entry Point | The SSO login URL provided by your IdP (sometimes called the SAML 2.0 Endpoint or Login URL).
Issuer The Entity ID or Issuer URL of your IdP. |
Certificate | X.509 signing certificate from your IdP. Paste the certificate content only — without the -----BEGIN CERTIFICATE----- and -----END CERTIFICATE----- headers, and without line breaks. |
Name ID Format | The format of the user identifier sent by your IdP. Common values include emailAddress (most common) or unspecified. |
In your IdP’s SAML application settings, you’ll need to provide the following values from your XMAP strategy configuration:
ACS / Callback URL
Entity ID / Audience
Use a unique value, or that which is required by your IdP.
Microsoft Entra ID metadata files use a default Issuer value (typically https://sts.windows.net/{tenant-id}/) which should not be used. Ensure the Issuer value in XMAP matches the Entity ID set under Basic SAML Configuration in Entra.
Step 4: Additional Settings
| Setting | Description |
Redirect To | The URL to redirect users to. Typically https://xmap.cloud or your custom domain (https://my-org.xmap.cloud) |
Default Profile | The profile new users are assigned to. |
Step 5: Test and Save
1. Click Save to store your configuration.
2. Click Test to open a new window and attempt a SAML login.
3. If the test succeeds, the window will confirm a successful authentication.
4. Share the Login URL from the strategy configuration with your users.
Troubleshooting
Login loops or errors
Double-check that the Entry Point URL and Certificate are correct. Ensure the Callback URL configured in your IdP matches the one shown in XMAP exactly, including the protocol (https://) and any trailing paths.
User not recognised
Verify that the Name ID Format matches what your IdP sends, and that the user’s email address exists in XMAP. The Name ID value sent by the IdP must match an existing XMAP user’s email.
Certificate errors
Make sure the certificate is pasted without the -----BEGIN CERTIFICATE----- / -----END CERTIFICATE----- headers and without line breaks. It should be a single continuous string of characters.
Test window closes immediately or shows a blank page
Check your browser’s pop-up blocker settings. The test opens a new window which may be blocked by default.
Attributes not mapping correctly
Ensure your IdP is sending the user’s email address as the Name ID claim. Some IdPs default to sending an opaque user ID instead.