SAML SSO Setup — Okta, Azure AD, and Generic Providers
SAML SSO Setup — Okta, Azure AD, and Generic Providers
Velaro V20 supports SAML 2.0 single sign-on for agent and admin login. Once configured, users log in through your identity provider (IdP) and land directly in the Velaro workspace — no separate Velaro password required.
Supported Identity Providers
- Okta
- Microsoft Azure Active Directory / Entra ID
- Google Workspace (via SAML app)
- PingIdentity / PingID (see PingID SAML SSO Setup Guide for detailed steps)
- OneLogin
- Any SAML 2.0-compliant provider
Step 1 — Get Velaro's SP Metadata
- Go to Settings → Security → Single Sign-On.
- Copy the Assertion Consumer Service (ACS) URL and Entity ID (SP Entity ID). You will paste these into your IdP.
- Download the SP Metadata XML if your IdP supports metadata import.
Step 2 — Configure Your Identity Provider
Okta
- In the Okta admin console, go to Applications → Create App Integration → SAML 2.0.
- Set Single Sign On URL to the Velaro ACS URL.
- Set Audience URI (SP Entity ID) to the Velaro Entity ID.
- Under Attribute Statements, add:
email→user.email,firstName→user.firstName,lastName→user.lastName. - Assign users or groups to the application.
- Download the IdP metadata XML or copy the IdP SSO URL and certificate.
Azure Active Directory / Entra ID
- In the Azure portal, go to Enterprise Applications → New Application → Create your own application → Non-gallery.
- Under Single sign-on → SAML, set the Identifier (Entity ID) and Reply URL (ACS URL) from Velaro.
- In Attributes & Claims, ensure
emailaddress,givenname, andsurnameare mapped. - Download the Federation Metadata XML from Azure for use in Velaro.
- Assign users or groups to the enterprise application.
Step 3 — Configure Velaro
- Back in Settings → Security → Single Sign-On, click Configure IdP.
- Paste or upload your IdP metadata XML. Alternatively, enter the IdP SSO URL, IdP Entity ID, and X.509 certificate manually.
- Map the SAML attribute names to Velaro fields (email, first name, last name are required; role is optional).
- Set the Default Role for new users provisioned via SSO (Agent, Supervisor, or Admin).
- Toggle Enforce SSO to require all users to log in through the IdP. When enforced, username/password login is disabled.
- Click Save & Test Connection.
Just-In-Time (JIT) Provisioning
When JIT provisioning is enabled, a new Velaro agent account is automatically created the first time a user authenticates via SSO. They receive the Default Role assigned in step 3. Existing accounts are matched by email address and updated with the latest attributes from the IdP on each login.
Troubleshooting
| Symptom | Likely Cause | Fix |
|---|---|---|
| Redirect loop after IdP login | ACS URL mismatch | Verify the ACS URL in your IdP exactly matches the one in Velaro Settings |
| "Invalid SAML response" error | Certificate expired or wrong | Re-download and re-upload the IdP certificate in Velaro |
| User created with wrong role | Role attribute not mapped | Add a role attribute in the IdP and map it in Velaro SSO settings |
| SSO works but user can't access certain pages | Permissions issue unrelated to SSO | Check the user's Role and Team membership in Velaro Settings → Agents |
Was this article helpful?