SAML
This documentation will describe the process of integrating a SAML application with Port, along with some examples for specific identity providers.
In order to integrate Port with a SAML SSO application, you will need to do the following:
- Create a new SAML application in your identity provider.
- Share with us the following information about your SSO application: X509 certificate (
.pem
file) and Signin URL (as defined in the application). - Port will provide you with a metadata XML file that you can upload in the SAML application to complete the connection.
- Update the application with the following attributes (Port expects the IdP to send the following attributes and their values in the authentication request, for example:
firstname
is the attribute in the IdP provider, andgiven_name
is the key Port expects to receive that data in the authorization mapping):- User attribute mappings -
target attribute name (Port)
:source attribute name (SSO app)
:email
:email
given_name
:firstname
family_name
:lastname
- Constant attributes:
email_verified
:true
- User attribute mappings -
If your login provider does not support metadata files, use the following information:
- IdP EntityID:
https://auth.getport.io
- SP EntityID: The EntityDescriptor field in the XML, looks like :
urn:auth0:port-prod:{CONNECTION_NAME}
where the{CONNECTION_NAME}
is the connection name as provided to you by Port. - callback URL: The AssertionConsumerService binding field in the XML, looks like:
https://auth.getport.io/login/callback?connection={CONNECTION_NAME}
where the{CONNECTION_NAME}
is the connection name as provided to you by Port.
📄️ Microsoft Entra ID (AzureAD)
Integrate Azure AD with Port using SAML
📄️ Google Workspace
Integrate Google Workspace with Port using SAML
📄️ JumpCloud
Integrate JumpCloud with Port using SAML
📄️ Okta (SAML)
Integrate Okta with Port using SAML