Single Sign-on (SSO)
Overview
Supermetal supports SAML 2.0-based Single Sign-on (SSO) for enterprise authentication. SSO allows organizations to:
- Manage user access to Supermetal through their existing identity provider
 - Enforce consistent security policies across applications
 - Enable multi-factor authentication through your identity provider
 
Supported Identity Providers
Supermetal supports SAML 2.0 integration with any identity provider, including:
Configuration Process
To set up SSO with Supermetal, you'll need to configure both your identity provider and the Supermetal Web Console. You'll need these common settings regardless of which provider you use:
Supermetal Service Provider Details
Provide these values to your identity provider:
| Setting | Value | 
|---|---|
| ACS URL / Callback URL | https://console.supermetal.io/saml/callback | 
| Entity ID / Audience URI | https://console.supermetal.io | 
| Start URL / Sign-on URL | https://console.supermetal.io/login | 
| Name ID Format | Email Address | 
Identity Provider Details
You'll need to gather these values from your identity provider to configure Supermetal:
| Setting | Description | 
|---|---|
| SAML SSO URL | The endpoint where Supermetal will send authentication requests | 
| SAML Entity ID | The unique identifier for your identity provider | 
| X.509 Certificate | The certificate to verify SAML responses | 
Provider Configuration
Prerequisites
- Super Admin access to your Google Workspace account
 - Administrator access to Supermetal
 
Google Workspace Configuration
- In your Google Admin console, go to Apps > Web and mobile apps > Add App > Search for SAML app.
 - Select Add custom SAML app.
 - Provide a name for the application (e.g., "Supermetal") and optionally upload the Supermetal logo.
 - On the Service provider details screen, enter the Supermetal service provider details from the table above.
 - For Name ID Format, select EMAIL.
 - For Name ID, select Basic Information > Primary email.
 - Download the SSO URL and certificate from Google Workspace.
 - Assign the application to the appropriate users or organizational units.
 
Supermetal Configuration
- In the Supermetal Web Console, navigate to Account Settings > Authentication > Configure SSO.
 - Enter the details from Google Workspace:
- SAML SSO URL: The URL provided by Google
 - SAML Entity ID: The Entity ID provided by Google
 - X.509 Certificate: The certificate downloaded from Google
 
 - Save the configuration.
 
Prerequisites
- Global Administrator access to your Microsoft Entra ID
 - Administrator access to Supermetal
 
Microsoft Entra ID Configuration
- In the Microsoft Entra admin center, go to Enterprise applications > New application.
 - Select Create your own application.
 - Enter a name for the application (e.g., "Supermetal"), select Integrate any other application you don't find in the gallery (Non-gallery) and click Create.
 - Under Set up single sign-on, select SAML.
 - In the Basic SAML Configuration section, enter the Supermetal service provider details from the table above.
 - In the User Attributes & Claims section, ensure that the NameID claim is set to user.mail or user.userprincipalname.
 - Download the Federation Metadata XML file or note the Login URL, Azure AD Identifier, and Logout URL.
 - Download the Certificate (Base64) from the SAML Signing Certificate section.
 - Assign users and groups to the application.
 
Supermetal Configuration
- In the Supermetal Web Console, navigate to Account Settings > Authentication > Configure SSO.
 - Enter the details from Entra ID:
- SAML SSO URL: The Login URL from Entra ID
 - SAML Entity ID: The Azure AD Identifier
 - X.509 Certificate: The Base64 certificate downloaded from Entra ID
 
 - Save the configuration.
 
Prerequisites
- Administrator access to your Okta account
 - Administrator access to Supermetal
 
Okta Configuration
- In your Okta Admin Dashboard, go to Applications > Applications.
 - Click Add Application > Create New App.
 - Select Web as the platform and SAML 2.0 as the sign-on method.
 - Enter a name for the application (e.g., "Supermetal").
 - In the SAML Settings section, enter the Supermetal service provider details from the table above.
 - For Name ID format, select EmailAddress.
 - For Application username, select Email.
 - Configure any additional attributes if needed.
 - After saving, go to the Sign On tab of the application and click View Setup Instructions.
 - Copy the Identity Provider Single Sign-On URL, Identity Provider Issuer, and download the X.509 Certificate.
 - Assign users to the application.
 
Supermetal Configuration
- In the Supermetal Web Console, navigate to Account Settings > Authentication > Configure SSO.
 - Enter the details from Okta:
- SAML SSO URL: The Identity Provider Single Sign-On URL from Okta
 - SAML Entity ID: The Identity Provider Issuer from Okta
 - X.509 Certificate: The X.509 Certificate downloaded from Okta
 
 - Save the configuration.
 
Testing and Enabling SSO
After configuring SSO with your identity provider:
- In the Supermetal Web Console, navigate to Account Settings > Authentication > SSO Settings.
 - Click Test Configuration to verify the integration works properly.
 - Once testing is successful, enable SSO for your organization by selecting the appropriate option:
- SSO Optional: Users can sign in with either SSO or username/password
 - SSO Required: All users must authenticate using SSO
 
 
Last updated on