SAML
This documentation will describe the process of integrating a SAML application with Port, along with some examples for specific identity providers.
In order to integrate Port with a SAML SSO application, you will need to do the following:
- Create a new SAML application in your identity provider.
- Share with us the following information about your SSO application: X509 certificate (
.pem
file) and Signin URL (as defined in the application). - Port will provide you with a metadata XML file that you can upload in the SAML application to complete the connection.
- Update the application with the following attributes (Port expects the IdP to send the following attributes and their values in the authentication request, for example:
firstname
is the attribute in the IdP provider, andgiven_name
is the key Port expects to receive that data in the authorization mapping):- User attribute mappings -
target attribute name (Port)
:source attribute name (SSO app)
:email
:email
given_name
:firstname
family_name
:lastname
- Constant attributes:
email_verified
:true
- User attribute mappings -
If your login provider does not support metadata files, use the following information:
- IdP EntityID:
https://auth.getport.io
- SP EntityID: The EntityDescriptor field in the XML, looks like :
urn:auth0:port-prod:{CONNECTION_NAME}
where the{CONNECTION_NAME}
is the connection name as provided to you by Port. - callback URL: The AssertionConsumerService binding field in the XML, looks like:
https://auth.getport.io/login/callback?connection={CONNECTION_NAME}
where the{CONNECTION_NAME}
is the connection name as provided to you by Port.
๐๏ธ Microsoft Entra ID (AzureAD)
Integrate Azure AD with Port using SAML
๐๏ธ Okta (SAML)
Integrate Okta with Port using SAML
๐๏ธ JumpCloud
Integrate JumpCloud with Port using SAML
๐๏ธ Google Workspace
Integrate Google Workspace with Port using SAML