Supported Providers
SAML 2.0
Industry-standard protocol for enterprise SSO with Okta, Azure AD, Google Workspace, and more.
OAuth 2.0
Modern authentication protocol for third-party identity providers.
SAML Configuration
Activepieces implements SAML 2.0 authentication using the Service Provider (SP) initiated flow.Prerequisites
Required Information
- IdP Metadata XML or URL
- IdP Certificate (for request signing)
- Attribute mappings
Setting Up SAML
- IdP Configuration
- Activepieces Setup
- Provider Examples
Configure Your Identity Provider
1. Create SAML Application
In your IdP, create a new SAML 2.0 application with these settings:Service Provider Details:2. Configure Attribute Mappings
| SAML Attribute | User Property | Required |
|---|---|---|
email | User email address | ✅ |
firstName | User first name | ✅ |
lastName | User last name | ✅ |
3. Download IdP Metadata
Export the IdP metadata XML or copy the metadata URL.SAML Authentication Flow
SAML Response Validation
Activepieces validates SAML responses:Security Configuration
SAML Security Settings
Activepieces enforces these security features:Certificate Management
Private Key Security
Private Key Security
- Store private key securely (encrypted at rest)
- Never expose in logs or client-side code
- Rotate keys annually or after security incidents
Certificate Rotation
Certificate Rotation
- Generate new key pair
- Update IdP with new certificate
- Update Activepieces configuration
- Test authentication
- Revoke old certificate
Key Requirements
Key Requirements
- Minimum 2048-bit RSA key
- PEM format
- No password protection (stored encrypted)
User Provisioning
When users authenticate via SSO:First-Time Login
Invitation Processing
If user has pending invitations, they’re automatically provisioned:
- Added to invited projects
- Assigned specified roles
- Invitations marked as accepted
Subsequent Logins
- User profile updated with latest attributes
- Login event recorded
- Session token issued
OAuth Providers
Activepieces also supports OAuth 2.0 for federated authentication:Supported OAuth Providers
Google Workspace accounts
GitHub
GitHub organization members
Microsoft
Azure AD / Microsoft 365
Custom
Any OAuth 2.0 provider
OAuth Configuration
Troubleshooting
Invalid SAML Response Error
Invalid SAML Response Error
Cause: Missing required attributes (email, firstName, lastName)Solution:
- Check IdP attribute mappings
- Verify attribute names match exactly
- Test with SAML tracer browser extension
Signature Verification Failed
Signature Verification Failed
Cause: IdP certificate mismatch or unsigned responsesSolution:
- Ensure IdP is configured to sign assertions
- Verify certificate in IdP metadata matches
- Check certificate format (PEM)
Redirect Loop
Redirect Loop
Cause: ACS URL misconfigurationSolution:
- Verify ACS URL in IdP matches exactly:
/api/v1/authn/saml/acs - Check domain configuration
- Ensure no trailing slashes
Users Not Provisioned
Users Not Provisioned
Cause: Platform ID not configured correctlySolution:
- Verify platform ID in SAML configuration
- Check custom domain settings
- Review platform resolution logic
Testing SSO
Production Checklist
Metadata Validation
✅ IdP metadata is valid XML
✅ All required endpoints present
✅ Certificate is valid and not expired
Attribute Mapping
✅ email, firstName, lastName mapped
✅ Attribute names match exactly
✅ Test with actual user accounts
Security
✅ Private key stored securely
✅ Message signing enabled
✅ Assertion encryption enabled
Testing
✅ Login flow works end-to-end
✅ User provisioning succeeds
✅ Audit events are logged
Related Topics
Users & Permissions
Configure user roles
Audit Logs
Track authentication events
Security Practices
General security guidelines