SAML configuration

In this article you will learn how to configure your Xopero login with SAML.

SAML provides secure single sign-on by integrating an identity provider (IdP) with Xopero ONE, allowing users to authenticate with centralized credentials while ensuring controlled access and compliance.


Overview

Xopero ONE integration works via the SAML 2.0 protocol, meaning any platform supporting this protocol can be integrated with Xopero ONE.

The configuration process is straightforward and requires only the entity ID, metadata URL, reply URL, and logout URL (the names may vary depending on the naming conventions used by specific platforms). In some cases, a certificate and a private key are also required.


Configuration

triangle-exclamation

Below table illustrates SAML integration configuration for selected platforms, including Auth0, Azure AD, CyberArk, Google, JumpCloud, Okta, and OneLogin.

circle-1Configuration in Auth0 circle-2Configuration in Xopero ONE

Configuration in Auth0

  1. Open your Auth0 admin dashboard, go to Dashboard > Applications > Applications, and hit Create Application button in the top-right corner of the screen.

  1. In Create application window enter a unique, custom application name (in this example we'll be using XoperoAuth0), select Regular Web Applications option, and click Create:

  1. In the newly created application window go to Settings tab, scroll down to the very bottom, and click Advanced Settings collapsible to expand it.

  1. Go to the Endpoints tab and locate SAML section. Copy the SAML Metadata URL and save it for later — it will be needed for Xopero ONE configuration.

  1. Scroll back to top and open the Addons tab, then toggle the SAML2 WEB APP button.

  1. In the window that opens up open the Settings tab and enter the Application Callback URL as follows:

https://XoperoONEManagementServiceURL/Auth/AssertionConsumerService

circle-exclamation
  1. In the same tab, scroll down inside the code input field and uncomment 31st, 32nd and 33rd line, then edit line 32 as follows:

circle-exclamation
  1. Once done, scroll down to the bottom of the addon window and click Enable button, then close the window to finish app configuration.


Configuration in Xopero ONE

  1. Login to your XMS web panel, go to Settings (bottom-left corner in the left-hand side menu) and select External Identity Providers.

  1. Click Add new provider button and fill in the details:

Name: your own custom name, i.e., Auth0

Entity ID: should be the same name you've set as application name in Auth0 (in this example it's XoperoAuth0)

  1. Next, paste the previously copied SAML Metadata URL in the Metadata URL field.

  1. Add certificate and password if required.

  2. Set up a default Language and Role for users with Auth0 SAML authentication permissions.

  3. Double-check the settings and hit Save at the bottom of Add identity provider tab.

  4. Click Save to finish the setup. You can now log out and test your configured SAML login integration.


Using IdP authentication method

To log in to Xopero ONE using a SAML-integrated identity provider, always start from the Xopero ONE panel. Do not log in from the IdP panel (for example, the Okta panel) to the application configured for Xopero ONE — the only exception is JumpCloud, which provides a built-in option to log in directly from its panel.

To enable an existing Xopero ONE user to log in via an identity provider (IdP), you must turn on the IdP login toggle for that account (⚙️ Settings > Accounts > Edit). Once an account is set to use an identity provider (IdP) for authentication, it cannot be switched back. To change the authentication method, you must delete the account and add it again.

triangle-exclamation

Last updated