With SSO (single sign-on), users can access their Workleap products without memorizing another username and password. Give them the option to sign in using their credentials for products like:
Slack
Google
Microsoft 365
And, with SAML, you can choose from countless identity providers (IdPs).
Workleap SSO types
SSO type | Quick in-app setup | Notes |
Slack | ✅ | N/A |
✅ | N/A | |
Microsoft 365 | ✅ | N/A |
SAML | ❌ |
|
Note: You can enable multiple SSO options at once.
Turn on SSO with quick in-app setup
Slack
To activate Slack SSO:
Open Settings and select SSO from the side menu.
Select Connect next to Slack.
Select Connect to your Slack workspace.
Slack SSO is activated per workspace. To connect additional workspaces, select Add another workspace. Select the trashcan icon to disconnect a workspace. Select the pencil icon to reconnect or delete a previously connected workspace.
Note: To manage your Slack SSO settings in the future, go to Settings > SSO > View settings (next to Slack).
Google or Microsoft 365
To activate Google or Microsoft 365 SSO for your Workleap account:
Open Settings and select SSO from the side menu.
Toggle on the product you want to activate.
Enforce SSO
Select the toggle to enforce SSO. If activated, your user base can only log in to your Workleap products using the SSO options you've activated. That means users won't be able to log in with their username/password or by opening magic links.
Note: If a user not in your SSO directory tries to log in with this option enabled, we'll let them know to contact you.
SAML
With SAML (Security Assertion Markup Language), you can set up Workleap SSO to work with a wide variety of identity providers (IdPs), including:
Okta Identity Cloud
OneLogin
JumpCloud
PING identity
CyberArk Identity
Auth0
Frontegg
WorkOS
SecureAuth
And many more
SAML considerations
Workleap only supports SAML 2.0.
Workleap does not support Single Logout (SLO).
All authentication requests must be signed by an SHA-256 algorithm.
Note: Workleap uses service provider (SP)-initiated SAML setups for better security and compatibility with our features.
Turn on SSO with SAML
To turn on SAML SSO for your organization, follow the steps below. For additional help, contact us using the widget in the corner of the screen.
Step 1: Create a SAML application
First, create a new SAML application in your identity provider (e.g., Azure AD, Okta, etc.). You will need an Assertion Consumer Service (ACS) URL and Entity ID to create the app. For now, enter https://www.placeholder.com as a temporary value in both fields (Workleap provides the final ACS URL and Entity ID in Step 3.)
Step 2: Send a request to our support team
Send a request to our support team asking to set up SAML for your account.
Please include your application's SAML metadata (from Step 1) in your request.
At least, we will need your:
Identity provider SSO URL.
Issuer URL.
X.509 certificate.
Step 3: Get our response
After our team finishes your SAML setup, we will send you:
An ACS URL.
An Entity ID.
The required attributes and NameID configuration (these are specific to your identity provider.)
Step 4: Add the new values to your SAML application
Now, return to your SAML application, and add in the values we sent you in Step 3. When complete, your users can log in to Workleap using their credentials from your chosen identity provider.
Note: For personalized help, contact us using the widget in the corner of the screen, or send a message to support@workleap.com.
