SAML configuration

In this article you will learn how to configure your Xopero login with SAML.

Xopero ONE integration works via the SAML 2.0 protocol, meaning any platform supporting this protocol can be integrated with XONE. The configuration is made simple, using only entity ID, metadata URL, reply URL, and logout URL (these names may vary depending on the naming conventions of specific platforms), and in some cases, a certificate and a private key.

Below table illustrates SAML integration configuration for selected platforms, including Auth0, Azure AD, CyberArk, Google, JumpCloud, Okta, and OneLogin.

Configuration in Auth0 Configuration in Xopero ONE

Configuration in Auth0

  1. Open your Auth0 admin dashboard, go to Dashboard > Applications > Applications, and hit Create Application button in the top-right corner of the screen.

  1. In Create application window enter a unique, custom application name (in this example we'll be using XoperoAuth0), select Regular Web Applications option, and click Create:

  1. In the newly created application window go to Settings tab, scroll down to the very bottom, and click Advanced Settings collapsible to expand it.

  1. Go to the Endpoints tab and locate SAML section. Copy the SAML Metadata URL and save it for later — it will be needed for Xopero ONE configuration.

  1. Scroll back to top and open the Addons tab, then toggle the SAML2 WEB APP button.

  1. In the window that opens up open the Settings tab and enter the Application Callback URL as follows:

https://XoperoONEManagementServiceURL/Auth/AssertionConsumerService

  1. In the same tab, scroll down inside the code input field and uncomment 31st, 32nd and 33rd line, then edit line 32 as follows:

“callback”: "https://XoperoONEManagementServiceURL/auth/SAMLLogoutResponse"
  1. Once done, scroll down to the bottom of the addon window and click Enable button, then close the window to finish app configuration.


Configuration in Xopero ONE

  1. Login to your XMS web panel, go to Settings (bottom-left corner in the left-hand side menu) and select External Identity Providers.

  1. Click Add new provider button and fill in the details:

Name: your own custom name, i.e., Auth0

Entity ID: should be the same name you've set as application name in Auth0 (in this example it's XoperoAuth0)

  1. Next, paste the previously copied SAML Metadata URL in the Metadata URL field.

  1. Add certificate and password if required.

  2. Set up a default Language and Role for users with Auth0 SAML authentication permissions.

  3. Double-check the settings and hit Save at the bottom of Add identity provider tab.

  4. Click Save to finish the setup. You can now log out and test your configured SAML login integration.

Last updated