SAML single sign-on
To enable SAML single sign-on (SSO) for authentication to DX, you must update settings in your SAML identity provider (IdP) as well as your DX workspace.
In a SAML configuration, DX functions as a SAML service provider (SP). See below for links to documentation for common identity providers:
SAML Provider | Documentation |
---|---|
Microsoft ADFS | Link |
Microsoft Entra | Link |
Okta | Link |
OneLogin | Link |
PingOne | Link |
Shibboleth | Link |
Enabling SAML SSO
To enable SAML SSO, configure the Single-sign on URL and Audience URI—which you can access in the SAML SSO settings—in your IdP, then enter the metadata URI from your IdP in DX.
Below are detailed descriptions of these three values:
Value | Other Names | Description | Example |
---|---|---|---|
ACS URL | Single-sign on URL | The location an Identity Provider redirects its authentication response to. | https://app.getdx.com/saml/acs/alazsZt7oh8xRbqK3nx0iwn5Xo41Lm |
SP Entity ID | Audience URI, SP URL, audience restriction | Used to identify the issuer of a SAML request and the audience of a SAML response | https://app.getdx.com/saml/sp/GvlKAGFgllQ14qP6amC1Duf6JOxr1T |
Metadata URI | IdP Metadata URI | URL where IdP publishes SAML metadata | https://app.onelogin.com/saml/metadata/a592596a-cfdb-3758-88d7-80b36a817128 |
When applicable, the nameID
should be an emailAddress (urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress) and must contain an email address that matches what is in DX. If you need an email address to match based solely on the part of the email preceding @ with a set of allowlisted domains, please contact DX support.
Requiring SAML SSO
You can enable SAML SSO in your organization without requiring all members to use it. Enabling but not requiring SAML SSO in your organization can help smooth adoption. When SAML SSO is enforced, all other methods of authentication (e.g., passwordless email, Slack OpenID) are disabled.